Cryptography and network security : (Record no. 754)

MARC details
000 -LEADER
fixed length control field 03275cam a2200409 i 4500
001 - CONTROL NUMBER
control field 14382296
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230526230127.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 060518s2006 njua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2006276085
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780132023221
Qualifying information paperback
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocm63126393
040 ## - CATALOGING SOURCE
Original cataloging agency SINTU
Language of cataloging eng
Transcribing agency SINTU
Modifying agency IXA
-- BAKER
-- DLC
-- EG-CaTKH
Description conventions rda
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .S713 2006
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 ST.C 2006 G.C
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William,
Relator term author.
245 10 - TITLE STATEMENT
Title Cryptography and network security :
Remainder of title principles and practice /
Statement of responsibility, etc. William Stallings.
250 ## - EDITION STATEMENT
Edition statement Fourth edition, Pearson International edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Upper Saddle River, N.J. :
Name of producer, publisher, distributor, manufacturer Pearson/Prentice Hall,
Date of production, publication, distribution, manufacture, or copyright notice 2006.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 680 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 663-672) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note pt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security.
520 ## - SUMMARY, ETC.
Summary, etc. In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name yomna.nassar
Cataloging process P
First Date, FD (RLIN) 20221201
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20221201
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 3
e ncip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Gift collections The Knowledge Hub Library The Knowledge Hub Library 02/25/2021   005.8 ST.C 2006 G.C 191693 02/25/2021 02/25/2021 Books