Cryptography and network security : (Record no. 37732)

INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781292158587
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 005.8 ST CR
MAIN ENTRY--PERSONAL NAME
Authors Stallings, William
TITLE STATEMENT
Title Cryptography and network security :
Subtitle principles and practice
Statement of responsibility, etc William Stallings
EDITION STATEMENT
Edition 7th global ed.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boston :
Publisher Pearson Education Limited,
Date c2017.
PHYSICAL DESCRIPTION
Extent 766 p. :
Other Details ill. ;
Size 24 cm.
GENERAL NOTE
General note Part Four: Cryptographic Data Integrity Algorithms.
CONTENTS
Contents Cover; Notation; Preface; Contents; About the Author; Part One: Background; Chapter 1 Computer and Network Security Concepts; 1.1 Computer Security Concepts; 1.2 The OSI Security Architecture; 1.3 Security Attacks; 1.4 Security Services; 1.5 Security Mechanisms; 1.6 Fundamental Security Design Principles; 1.7 Attack Surfaces and Attack Trees; 1.8 A Model for Network Security; 1.9 Standards; 1.10 Key Terms, Review Questions, and Problems; Chapter 2 Introduction to Number Theory; 2.1 Divisibility and the Division Algorithm; 2.2 The Euclidean Algorithm; 2.3 Modular Arithmetic; 2.4 Prime Numbers. 2.5 Fermat's and Euler's Theorems2.6 Testing for Primality; 2.7 The Chinese Remainder Theorem; 2.8 Discrete Logarithms; 2.9 Key Terms, Review Questions, and Problems; Appendix 2A The Meaning of Mod; Part Two: Symmetric Ciphers; Chapter 3 Classical Encryption Techniques; 3.1 Symmetric Cipher Model; 3.2 Substitution Techniques; 3.3 Transposition Techniques; 3.4 Rotor Machines; 3.5 Steganography; 3.6 Key Terms, Review Questions, and Problems; Chapter 4 Block Ciphers and the Data Encryption Standard; 4.1 Traditional Block Cipher Structure; 4.2 The Data Encryption Standard; 4.3 A DES Example. 4.4 The Strength of DES4.5 Block Cipher Design Principles; 4.6 Key Terms, Review Questions, and Problems; Chapter 5 Finite Fields; 5.1 Groups; 5.2 Rings; 5.3 Fields; 5.4 Finite Fields of the Form GF(p); 5.5 Polynomial Arithmetic; 5.6 Finite Fields of the Form GF(2n); 5.7 Key Terms, Review Questions, and Problems; Chapter 6 Advanced Encryption Standard; 6.1 Finite Field Arithmetic; 6.2 AES Structure; 6.3 AES Transformation Functions; 6.4 AES Key Expansion; 6.5 An AES Example; 6.6 AES Implementation; 6.7 Key Terms, Review Questions, and Problems. Appendix 6A Polynomials with Coefficients in GF(28)Chapter 7 Block Cipher Operation; 7.1 Multiple Encryption and Triple DES; 7.2 Electronic Codebook; 7.3 Cipher Block Chaining Mode; 7.4 Cipher Feedback Mode; 7.5 Output Feedback Mode; 7.6 Counter Mode; 7.7 XTS-AES Mode for Block-Oriented Storage Devices; 7.8 Format-Preserving Encryption; 7.9 Key Terms, Review Questions, and Problems; Chapter 8 Random Bit Generation and Stream Ciphers; 8.1 Principles of Pseudorandom Number Generation; 8.2 Pseudorandom Number Generators; 8.3 Pseudorandom Number Generation Using a Block Cipher; 8.4 Stream Ciphers. 8.5 RC48.6 True Random Number Generators; 8.7 Key Terms, Review Questions, and Problems; Part Three: Asymmetric Ciphers 283; Chapter 9 Public-Key Cryptography and RSA; 9.1 Principles of Public-Key Cryptosystems; 9.2 The RSA Algorithm; 9.3 Key Terms, Review Questions, and Problems; Chapter 10 Other Public-Key Cryptosystems; 10.1 Diffie-Hellman Key Exchange; 10.2 Elgamal Cryptographic System; 10.3 Elliptic Curve Arithmetic; 10.4 Elliptic Curve Cryptography; 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher; 10.6 Key Terms, Review Questions, and Problems.
SUMMARY
Summary The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security, Seventh Edition, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer networks
General Security measures
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Data encryption (Computer science)
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/5vnk9zyu38eescpj5fjcd66tyw32exw9
Public note Location Map
MAIN ENTRY--PERSONAL NAME
-- 9052
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 2602
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 5422
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2021-04-01 ABE 2 3 005.8 ST CR T0064773 2022-12-16 2022-11-23 2020-07-14 REGULAR
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2021-05-24 ABE 1 1 005.8 ST CR T0064774 2023-03-10 2022-09-02 2020-07-14 REGULAR
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2021-05-24 ABE     005.8 ST CR T0065197 2021-05-24   2020-07-14 REGULAR

Powered by Koha