03332cam 2200409 i 450000100090000000300040000900500170001300800410003001000170007102000290008803500230011704000540014004200140019405000260020808200280023410000330026224500870029525000510038226400630043330000470049633600260054333700290056933800280059850400670062650508580069352009890155165000420254065000390258265000190262165000230264090600450266394200120270895201310272099800300285199800280288199900130290914382296OSt20230526230127.0060518s2006 njua b 001 0 eng d a 2006276085 a9780132023221qpaperback a(OCoLC)ocm63126393 aSINTUbengcSINTUdIXAdBAKERdDLCdEG-CaTKHerda alccopycat00aTK5105.59b.S713 200600a005.8 ST.C 2006 G.C2231 aStallings, William,eauthor.10aCryptography and network security :bprinciples and practice /cWilliam Stallings. aFourth edition, Pearson International edition. 1aUpper Saddle River, N.J. : bPearson/Prentice Hall,c2006. axvi, 680 pages : billustrations ;c24 cm. atextbtxt2rdacontent aunmediated bn2rdamedia avolume bnc2rdacarrier aIncludes bibliographical references (pages 663-672) and index.0 apt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security. aIn this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists. 0aComputer networksxSecurity measures. 0aData encryption (Computer science) 0aCoding theory. 0aComputer security. a7bcbcccopycatd3encipf20gy-gencatlg 2ddccBK 00102ddc40708Gift collectionsaKNOWbKNOWd2021-02-25l0o005.8 ST.C 2006 G.Cp191693r2021-02-25 00:00:00w2021-02-25yBK ayomna.nassarbPd20221201 amona.romiabRd20221201 c754d754