000 01487cam a22002057a 4500
999 _c7059
_d7059
020 _a0131873164
050 0 0 _aTK5105.59
_b.S713
100 1 _aStallings, William.
245 1 0 _aCryptography and network security :
_bprinciples and practice /
_cWilliam Stallings.
250 _a4th ed.
260 _aUpper Saddle River, N.J. :
_bPearson/Prentice Hall,
_cc2006.
300 _axvi, 680 p. :
_bill. ;
_c24 cm.
500 _aIncludes index
505 _aC.1 - Introduction pt.1- Symmetric ciphers. C.2 Classical encryption techniques -- C.3 Block ciphers and the data encryption standard -- C.4 Finite fields -- C.5 Advanced encryption standard -- C.6 More on symmetric ciphers -- C. Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. C.8 Introduction to number theory -- C.9 Public-key cryptography and RSA -- C.10 Key management: other public-key cryptosystems -- C.11 Message authentication and hash functions -- C.12 Hash and MAC algorithms -- C.13 Digital signatures and authentication protocols -- pt. 3: Network security applications. C.14 Authentication applications -- C.15 Electronic mail security -- C.16 IP security -- C.17 Web security -- pt. 4: System security. C.18 Intruders -- C.19 Malicious software -- C.20 Firewalls -
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData encryption (Computer science)
650 0 _aCoding theory.
650 0 _aComputer security.
942 _cBK