000 | 02638cam a2200385 i 4500 | ||
---|---|---|---|
999 |
_c312 _d312 |
||
001 | 17622095 | ||
005 | 20220210072831.0 | ||
008 | 130211s2017 enka b 001 0 eng | ||
010 | _a 2012047341 | ||
020 |
_a9781292154855 _qpaperback |
||
020 |
_a1292154853 _qpaperback |
||
040 |
_aDLC _beng _cDLC _erda _dENG-CaTKH |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.59 _b.S725 2014 |
082 | 0 | 0 |
_a005.8 ST.N 2014 _223 |
100 | 1 |
_aStallings, William, _eauthor. |
|
245 | 1 | 0 |
_aNetwork security essentials : _bapplications and standards / _cWilliam Stallings. |
250 | _aSixth edition, Global edition. | ||
264 | 1 |
_aBoston : _bPearson, _c2017. |
|
300 |
_axvii, 461 pages : _billustrations ; _c23 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _a"Authorized adaptation from the United States edition, entitled Network security essentials: applications and standards, 6th edition, ISBN 9780134527338, by William Stallings published by Pearson Education ©2017"--Title page verso. | ||
504 | _aIncludes bibliographical references (pages 442-447) and index. | ||
505 | 0 | _a1. Introduction. Part I: Cryptography. 2. Symmetric Encryption and Message confidentiality. 3. Public-Key Cryptography and Message Authentication. 4. Key Distribution and User Authentication. 5. Network Access Control and Cloud Security. 6. Transport-Level Security. 7. Wireless Network Security. 8. Electronic Mail Security. 9. IP Security. Part III: System Security. 10. Malicious Software. 11. Intruders. 12. Firewalls. APPENDICES: Appendix A. Some Aspects of Number Theory. Appendix B. Projects for Teaching Network Security. | |
520 | _aFor courses in Corporate, Computer and Network Security . Network Security: Innovations and Improvements Network Securities Essentials: Applications and Standards introduces students to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
942 |
_2ddc _cBK |
||
998 |
_ahuda.mahmoud _bM _d2022028 |
||
998 |
_amona.romia _bR _d20220210 |
||
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |