Cryptography and network security : principles and practice (Record no. 4326)

MARC details
000 -LEADER
fixed length control field 03009nam a2200265Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field RRU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240623133635.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210901s2018 ||||||||| ||||||| 0|eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789332585225
Printed Price Rs, 489.21
040 ## - CATALOGING SOURCE
Original cataloging agency RRU
Language of cataloging English
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title Eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Class No. 651.8
Item number STA
100 ## - FIRST AUTHOR (IF A PERSON)
9 (RLIN) 4667
Name of author Stallings, William
245 #0 - TITLE STATEMENT
Title Cryptography and network security : principles and practice
Statement of responsibility Stallings, William
250 ## - EDITION STATEMENT
Edition statement 7th Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Pearson
Date of publication, distribution, etc. 2018
Place of publication, distribution, etc. Chennai
300 ## - PHYSICAL DESCRIPTION
No. of pages 766p
520 ## - SUMMARY, ETC.
Summary, etc. Pearson brings to you the revised edition of Cryptography and Network Security by Stallings. In an age of viruses and hackers, electronic eavesdropping and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security—practical applications that have been implemented and are in use to provide network security.Features1. Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes.2. Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important algorithms and allow students to assess their relative strengths and weaknesses.3. New sections on fundamental security design principles, attack surfaces and attack trees.4. Chapter on Email Security has been completely rewritten to provide a comprehensive and up to-date discussion of the topic.5. Discussion on user authentication model, cloud security and Transport Layer Security has been thoroughly reorganized and expanded in the new edition to reflect recent developments. Table of Contents Chapter 1 Computer and Network Security Concepts Chapter 2 Introduction to Number Theory Chapter 3 Classical Encryption Techniques Chapter 4 Block Ciphers and the Data Encryption Standard Chapter 5 Finite Fields Chapter 6 Advanced Encryption Standard Chapter 7 Block Cipher Operation Chapter 8 Random Bit Generation and Stream Ciphers Chapter 9 Public-Key Cryptography and RSA Chapter 10 Other Public-Key Cryptosystems Chapter 11 Cryptographic Hash Functions Chapter 12 Message Authentication Codes Chapter 13 Digital Signatures Chapter 14 Key Management and Distribution Chapter 15 User Authentication Protocols Chapter 16 Network Access Control and Cloud Security Chapter 17 Transport-Level Security Chapter 18 Wireless Network Security Chapter 19 Electronic Mail Security Chapter 20 IP Security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Computer networks--Security measures
9 (RLIN) 1267
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Data encryption (Computer science)
9 (RLIN) 2175
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Coding theory
9 (RLIN) 4539
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Computer security
9 (RLIN) 1346
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Subject heading Public key cryptography
9 (RLIN) 4668
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan (e.g. reference copy) Home library Current library Date acquired Inventory number Total Checkouts Total Renewals Full call number Accession No Date last seen Date last checked out Item MRP (printed price) Price effective from Koha item type
    Dewey Decimal Classification     Rashtriya Raksha University Rashtriya Raksha University 02/07/2019 07128 2 2 651.8 STA 7128 11/05/2024 03/05/2024 489.21 02/09/2021 Books
© 2024 Rashtriya Raksha University, All Rights Reserved.