Lataa...

Cryptography and network security : principles and practice /

Bibliografiset tiedot
Päätekijä: Stallings, William
Aineistotyyppi: Printed Book
Kieli:English
Julkaistu: New Delhi Pearson 2011
Painos:5th ed.
Aiheet:
LEADER 02775cam a2200337 a 4500
003 AuCNLKIN
008 060220s2006 njua b 001 0 eng d
010 |a 2006276085 
020 |a 9788177587746 (pbk.) 
039 |a (OCoLC)63126393 
042 |a lccopycat 
082 1 |a 005.8  |2 22 
100 1 |a Stallings, William. 
245 1 0 |a Cryptography and network security :  |b principles and practice /  |c William Stallings. 
250 |a 5th ed. 
260 |a New Delhi  |b Pearson  |c 2011 
300 |a xvi, 743p. :  |b ill. ;  |c 24 cm. 
500 |a Previous ed.: 2003. 
504 |a Includes bibliographical references and index. 
505 0 |a PART ONE SYMMETRIC CIPHERS-- Chapter 2 Classical Encryption Techniques-- Chapter 3 Block Ciphers and the Data Encryption Standard-- Chapter 4 Finite Fields-- Chapter 5 Advanced Encryption Standard-- Chapter 6 More on Symmetric Ciphers-- Chapter 7 Confidentiality Using Symmetric Encryption-- PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS-- Chapter 8 Introduction to Number Theory-- Chapter 9 Public-Key Cryptography and RSA-- Chapter 10 Key Management; Other Public-Key Cryptosystems-- Chapter 11 Message Authentication and Hash Functions-- Chapter 12 Hash and MAC Algorithms-- Chapter 13 Digital Signatures and Authentication Protocols-- PART THREE NETWORK SECURITY APPLICATIONS-- Chapter 14 Authentication Applications-- Chapter 15 Electronic Mail Security-- Chapter 16 IP Security-- Chapter 17 Web Security--PART FOUR SYSTEM SECURITY--Chapter 18 Intruders-- Chapter 19 Malicious Software-- Chapter 20 Firewalls. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory. 
650 0 |a Computer security. 
942 |c BK 
999 |c 333174  |d 333174 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_STA_C  |7 0  |9 380597  |a DCS  |b DCS  |c ST1  |d 2019-03-26  |e publication division, university of calicut  |g 385.00  |i 132  |l 0  |o 005.8 STA/C  |p DCS132  |r 2019-03-26  |w 2019-03-26  |y BK 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_STA_C  |7 0  |9 380598  |a DCS  |b DCS  |c ST1  |d 2019-03-26  |e publication division, university of calicut  |g 385.00  |i 133  |l 0  |o 005.8 STA/C  |p DCS133  |r 2019-03-26  |y BK 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_STA_C  |7 0  |9 380599  |a DCS  |b DCS  |c ST1  |d 2019-03-26  |e publication division, university of calicut  |g 385.00  |i 134  |l 0  |o 005.8 STA/C  |p DCS134  |r 2019-03-26  |y BK 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_STA_C  |7 0  |9 408907  |a DCS  |b DCS  |c ST1  |d 2020-10-23  |e publication division, university of calicut  |g 385.00  |i 504  |l 0  |o 005.8 STA/C  |p DCS504  |r 2019-03-26  |w 2020-10-23  |y BK 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_STA_C  |7 0  |9 409697  |a DCS  |b DCS  |c ST1  |d 2020-11-23  |e publication division, university of calicut  |g 385.00  |i 30  |l 0  |o 005.8 STA/C  |p DCS30  |r 2019-03-26  |w 2020-11-23  |y BK