Cryptography and network security : principles and practice (Record no. 35114)

000 -LEADER
fixed length control field 02355 a2200205 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240627110936.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240627b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789357059718
040 ## - CATALOGING SOURCE
Original cataloging agency ICTS-TIFR
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59 .S713
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William
245 ## - TITLE STATEMENT
Title Cryptography and network security : principles and practice
250 ## - EDITION STATEMENT
Edition statement Indian edition
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Name of publisher, distributor, etc. Pearson India,
Place of publication, distribution, etc. Noida:
Date of publication, distribution, etc. [c2023]
300 ## - Physical Description
Pages: 832 p.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Table of Contents: <br/>1. Information and Network Security Concepts<br/>2. Introduction to Number Theory<br/>3. Classical Encryption Techniques<br/>4. Block Ciphers and the Data Encryption Standard<br/>5. Finite Fields<br/>6. Advanced Encryption Standard<br/>7. Block Cipher Operation<br/>8. Random Bit Generation and Stream Ciphers<br/>9. Public-Key Cryptography and RSA<br/>10. Other Public-Key Cryptosystems<br/>11. Cryptographic Hash Functions<br/>12. Message Authentication Codes<br/>13. Digital Signatures<br/>14. Lightweight Cryptography and Post-Quantum Cryptography<br/>15. Key Management and Distribution<br/>16. User Authentication Protocols<br/>17. Transport-Level Security<br/>18. Wireless Network Security<br/>19. Electronic Mail Security<br/>20. IP Security<br/>21. Network Endpoint Security<br/>22. Cloud Security<br/>23. Internet of Things (IoT) Security<br/>Appendix A. Basic Concepts from Linear Algebra<br/>Appendix B. Measures of Security and Secrecy<br/>Appendix C. Data Encryption Standard (DES)<br/>Appendix D. Simplified AES<br/>Appendix E. Mathematical Basis of the Birthday Attack
520 ## - SUMMARY, ETC.
Summary, etc. Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.---Summary provided by the publisher
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Shelving location Date acquired Inventory number Full call number Accession No. Checked out Koha item type
        ICTS Rack No 14 06/27/2024 IN135 dt.24 June 2024 TK5105.59 .S713 02832 08/12/2024 Book