The Locator -- [(subject = "Data encryption Computer science")]

385 records matched your query       


Record 4 | Previous Record | Long Display | Next Record
03281aam a2200409 i 4500
001 BCC84A40C19D11EEA89D2B6520ECA4DB
003 SILO
005 20240202013317
008 220506s2023    enka     b    001 0 eng d
020    $a 1292437480
020    $a 9781292437484
035    $a (OCoLC)1328028535
040    $a UKMGB $b eng $e rda $c UKMGB $d OCLCF $d YDX $d YT1 $d OCLCO $d YT1 $d U3W $d SILO
050  4 $a TK5105.59 $b .S713 2023
082 04 $a 005.82 $2 23
100 1  $a Stallings, William, $e author. $1 https://isni.org/isni/0000000114728236
245 10 $a Cryptography and network security : $b principles and practice / $c William Stallings.
250    $a Eighth edition.
250    $a Global edition.
264  1 $a Harlow : $b Pearson, $c [2023]
300    $a 832 pages : $b illustrations (chiefly color) ; $c 24 cm
500    $a Previous edition: 2017.
504    $a Includes bibliographical references and index.
505 0  $a 1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Lightweight Cryptography and Post-Quantum Cryptography 15. Key Management and Distribution 16. User Authentication Protocols 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security 21. Network Endpoint Security 22. Cloud Security 23. Internet of Things (IoT) Security Appendix A. Basic Concepts from Linear Algebra Appendix B. Measures of Security and Secrecy Appendix C. Data Encryption Standard (DES) Appendix D. Simplified AES Appendix E. Mathematical Basis of the Birthday.
520    $a "Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security." -- Provided by publisher.
650  0 $a Data encryption (Computer science)
650  0 $a Computer networks $x Security measures.
650  6 $a Chiffrement (Informatique)
650  6 $a Réseaux d'ordinateurs $x Mesures. $x Mesures.
650  7 $a Computer networks $x Security measures $2 fast
650  7 $a Data encryption (Computer science) $2 fast
650  7 $a Computers and IT. $2 ukslc
776 08 $i ebook version : $z 9781292437491
941    $a 1
952    $l UNUX074 $d 20240202024033.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=BCC84A40C19D11EEA89D2B6520ECA4DB
994    $a Z0 $b NIU

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.