MARC details
000 -LEADER |
fixed length control field |
02866nmm a2200217Ia 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220920s9999||||xx |||||||||||||| ||und|| |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781292158594 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
St16C |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stallings, William. |
Relator term |
Author |
Language of a work |
English |
9 (RLIN) |
1010 |
245 #0 - TITLE STATEMENT |
Title |
Cryptography and Network Security |
Remainder of title |
: Principles and Practice |
Statement of responsibility, etc. |
/ by William Stallings. |
Medium |
[Electronic Resource] |
250 ## - EDITION STATEMENT |
Edition statement |
7th Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Harlow |
Name of publisher, distributor, etc. |
: Pearson Education, |
Date of publication, distribution, etc. |
2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
767p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
For courses in Cryptography, Computer Security, and Network Security The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. This edition streamlines subject matter with new and updated material -- including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for instructors and students to ensure a successful teaching and learning experience. The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps. Upon purchase, you'll gain instant access to this eBook. Time limit The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Coding Theory |
9 (RLIN) |
2427 |
|
Topical term or geographic name entry element |
Cryptography |
9 (RLIN) |
15951 |
|
Topical term or geographic name entry element |
Data Encryption |
9 (RLIN) |
2429 |
|
Topical term or geographic name entry element |
Network Security |
9 (RLIN) |
2430 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://ebookcentral.proquest.com/lib/iitjin/detail.action?docID=5186001">https://ebookcentral.proquest.com/lib/iitjin/detail.action?docID=5186001</a> |
Electronic format type |
PDF |
Link text |
Click to Access the Online Book |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
e-Book |
Suppress in OPAC |
|