Language:
English
繁體中文
KMU OLIS
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptography and network security :p...
~
Stallings, William.
Cryptography and network security :principles and practice /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cryptography and network security :/ William Stallings.
Reminder of title:
principles and practice /
Author:
Stallings, William.
Published:
Boston :Pearson, : 2014,
[NT 15000922]:
6th edition.
Description:
xix, 731 pages :illustrations ; : 24 cm.;
Subject:
Computer networks - Security measures. -
ISBN:
9780133354690 (alk. paper) :
Cryptography and network security :principles and practice /
Stallings, William.
Cryptography and network security :
principles and practice /William Stallings. - 6th edition. - Boston :Pearson,2014 - xix, 731 pages :illustrations ;24 cm.
Includes bibliographical references (pages 710-719) and index.
Chapter 0 Guide for Readers and Instructors -- chapter 1. Overview -- Part One. Symmetric Ciphers: chapter 2. Classical Encryption Techniques; chapter 3. Block Ciphers and the Data Encryption Standard; chapter 4. Basic Concepts in Number Theory and Finite Fields; chapter 5. Advanced Encryption Standard; chapter 6. Block Cipher Operation; chapter 7. Pseudorandom Number Generation and Stream Ciphers -- Part Two. Assymetric Ciphers: chapter 8. More Number Theory; chapter 9. Public-Key Cryptography and RSA; chapter 10. Other Public-Key Cryptosystems -- Part Three. Cryptographic Data Integrity Algorithms: chapter 11. Cryptographic Hash Functions; chapter 12. Message Authentication Codes; chapter 13. Digital Signatures Part Four: Mutual Trust: chapter 14. Key Management and Distribution; chapter 15. User Authentication -- Part Five. Network And Internet Security: chapter 16. Network Access Control and Cloud Security; chapter 17. Transport-Level Security; chapter 18. Wireless Network Security; chapter 19. Electronic Mail Security; chapter 20. IP Security -- Appendices: Appendix A. Projects for Teaching Cryptography and Network Security; Appendix B. Sage Examples.
ISBN: 9780133354690 (alk. paper) :NT5000
LCCN: 2012047546Subjects--Topical Terms:
233826
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .S713 2014
Dewey Class. No.: 005.8
Cryptography and network security :principles and practice /
LDR
:02090cam 2200289 i 4500
001
277373
003
OCoLC
005
20140612111214.0
008
141113s2014 maua b 001 0 eng
010
$a
2012047546
019
$a
847481369
020
$a
9780133354690 (alk. paper) :
$c
NT5000
020
$a
0133354695 (alk. paper)
035
$a
825749781
040
$a
DLC
$b
eng
$e
rda
$c
DLC
$d
BTCTA
$d
OCLCO
$d
YDXCP
$d
OSU
$d
BWX
$d
AU@
$d
OCLCF
$d
IUL
$d
KMU
042
$a
pcc
050
0 0
$a
TK5105.59
$b
.S713 2014
082
0 0
$a
005.8
$2
23
087
$a
312.9
100
1
$2
97000
$a
Stallings, William.
$3
233825
245
1 0
$a
Cryptography and network security :
$b
principles and practice /
$c
William Stallings.
250
$a
6th edition.
260
# 1
$a
Boston :
$b
Pearson,
$c
2014
300
$a
xix, 731 pages :
$b
illustrations ;
$c
24 cm.
336
$a
text
$2
rdacontent.
337
$a
unmediated
$2
rdamedia.
338
$a
volume
$2
rdacarrier.
504
$a
Includes bibliographical references (pages 710-719) and index.
505
0 #
$a
Chapter 0 Guide for Readers and Instructors -- chapter 1. Overview -- Part One. Symmetric Ciphers: chapter 2. Classical Encryption Techniques; chapter 3. Block Ciphers and the Data Encryption Standard; chapter 4. Basic Concepts in Number Theory and Finite Fields; chapter 5. Advanced Encryption Standard; chapter 6. Block Cipher Operation; chapter 7. Pseudorandom Number Generation and Stream Ciphers -- Part Two. Assymetric Ciphers: chapter 8. More Number Theory; chapter 9. Public-Key Cryptography and RSA; chapter 10. Other Public-Key Cryptosystems -- Part Three. Cryptographic Data Integrity Algorithms: chapter 11. Cryptographic Hash Functions; chapter 12. Message Authentication Codes; chapter 13. Digital Signatures Part Four: Mutual Trust: chapter 14. Key Management and Distribution; chapter 15. User Authentication -- Part Five. Network And Internet Security: chapter 16. Network Access Control and Cloud Security; chapter 17. Transport-Level Security; chapter 18. Wireless Network Security; chapter 19. Electronic Mail Security; chapter 20. IP Security -- Appendices: Appendix A. Projects for Teaching Cryptography and Network Security; Appendix B. Sage Examples.
650
# 0
$2
96060
$a
Computer networks
$x
Security measures.
$3
233826
650
# 0
$2
96060
$a
Data encryption (Computer science)
$3
233827
650
# 0
$2
96060
$a
Coding theory.
$3
233828
650
# 0
$2
96060
$a
Computer security.
$3
233829
based on 0 review(s)
ALL
前棟3F一般圖書區(圖書館) 3F General Monographic Collections (Front Building)
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Volume Number
Loan Status
No. of reservations
Opac note
Attachments
00359196
前棟3F一般圖書區(圖書館) 3F General Monographic Collections (Front Building)
一般圖書
一般圖書 (Book)
312.9 S775 2014
一般使用(Normal)
On shelf
0
Reserve
1 records • Pages 1 •
1
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login