Network security essentials : (Record no. 32186)

INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781292154855
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 005.8 ST NE
MAIN ENTRY--PERSONAL NAME
Authors Stallings, William
TITLE STATEMENT
Title Network security essentials :
Subtitle applications and standards
Statement of responsibility, etc William Stallings
EDITION STATEMENT
Edition 6th global ed.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Harlow :
Publisher Pearson,
Date c2017.
PHYSICAL DESCRIPTION
Extent xvi, 461 p. :
Other Details ill. ;
Size 23 cm.
GENERAL NOTE
General note Includes Internet access.
CONTENTS
Contents 1. IntroductionPart I: Cryptography2. Symmetric Encryption and Message3. Public-Key Cryptography and Message4. Key Distribution and User Authentication5. Network Access Control and Cloud Security6. Transport-Level Security7. Wireless Network Security8. Electronic Mail Security9. IP SecurityPart III: System Security10. Malicious Software11. Intruders12. FirewallsAPPENDICESAppendix A Some Aspects of Number TheoryAppendix B Projects for Teaching Network Security.
SUMMARY
Summary For computer science, computer engineering, and electrical engineering majors taking a one-semester undergraduate courses on network security. A practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards , Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. an unparalleled support package for instructors and students ensures a successful teaching and learning experience. Adapted from Cryptography and Network Security, Sixth Edition, this text covers the same topics but with a much more concise treatment of cryptography.
STUDY PROGRAM
Program name CSCI368 ISIT201
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer networks
General Security measures
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer security
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uow.primo.exlibrisgroup.com/permalink/61UOW_INST/otb3u8/cdi_askewsholts_vlebooks_9781292154916
Public note Ebook
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/5vnk9zyu38eescpj5fjcd66tyw32exw9
Public note Location Map
MAIN ENTRY--PERSONAL NAME
-- 9052
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2602
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 641
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2017-10-30 AMAUK 1 1 005.8 ST NE T0057514 2018-01-11 2017-12-20 2017-09-19 3 DAY LOAN
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2018-09-05 AMAUK 1 1 005.8 ST NE T0060371 2023-03-10 2022-09-02 2018-07-30 REGULAR
        University of Wollongong in Dubai University of Wollongong in Dubai Closed Reserve 2018-07-30 AMAUK     005.8 ST NE T0060372 2018-07-30   2018-07-30 CRS

Powered by Koha