Cryptography and Network Security. (Record no. 25639)

MARC details
000 -LEADER
fixed length control field 10630nam a22003853i 4500
001 - CONTROL NUMBER
control field EBC5127075
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190107115955.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2010 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131739365
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5127075
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5127075
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL269309
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1024280971
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 005.82
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
245 10 - TITLE STATEMENT
Title Cryptography and Network Security.
250 ## - EDITION STATEMENT
Edition statement 5th ed.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (900 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Contents -- Notation -- Preface -- About the Author -- Chapter 0 Reader's Guide -- 0.1 Outline of This Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Chapter 1 Overview -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Recommended Reading and Web Sites -- 1.8 Key Terms, Review Questions, and Problems -- PART ONE: SYMMETRIC CIPHERS -- Chapter 2 Classical Encryption Techniques -- 2.1 Symmetric Cipher Model -- 2.2 Substitution Techniques -- 2.3 Transposition Techniques -- 2.4 Rotor Machines -- 2.5 Steganography -- 2.6 Recommended Reading and Web Sites -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Block Ciphers and the Data Encryption Standard -- 3.1 Block Cipher Principles -- 3.2 The Data Encryption Standard (DES) -- 3.3 A DES Example -- 3.4 The Strength of DES -- 3.5 Differential and Linear Cryptanalysis -- 3.6 Block Cipher Design Principles -- 3.7 Recommended Reading and Web Site -- 3.8 Key Terms, Review Questions, and Problems -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- 4.1 Divisibility and the Division Algorithm -- 4.2 The Euclidean Algorithm -- 4.3 Modular Arithmetic -- 4.4 Groups, Rings, and Fields -- 4.5 Finite Fields of the Form GF(p) -- 4.6 Polynomial Arithmetic -- 4.7 Finite Fields of the Form GF(2[sup(n)]) -- 4.8 Recommended Reading and Web Sites -- 4.9 Key Terms, Review Questions, and Problems -- Appendix 4A: The Meaning of mod -- Chapter 5 Advanced Encryption Standard -- 5.1 The Origins AES -- 5.2 AES Structure -- 5.3 AES Round Functions -- 5.4 AES Key Expansion -- 5.5 An AES Example -- 5.6 AES Implementation -- 5.7 Recommended Reading and Web Sites -- 5.8 Key Terms, Review Questions, and Problems.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Appendix 5A: Polynomials with Coefficients in GF(2[sup(8)]) -- Appendix 5B: Simplified AES -- Chapter 6 Block Cipher Operation -- 6.1 Multiple Encryption and Triple DES -- 6.2 Electronic Codebook Mode -- 6.3 Cipher Block Chaining Mode -- 6.4 Cipher Feedback Mode -- 6.5 Output Feedback Mode -- 6.6 Counter Mode -- 6.7 XTS Mode for Block-Oriented Storage Devices -- 6.8 Recommended Web Site -- 6.9 Key Terms, Review Questions, and Problems -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- 7.1 Principles of Pseudorandom Number Generation -- 7.2 Pseudorandom Number Generators -- 7.3 Pseudorandom Number Generation Using a Block Cipher -- 7.4 Stream Ciphers -- 7.5 RC4 -- 7.6 True Random Numbers -- 7.7 Recommended Reading -- 7.8 Key Terms, Review Questions, and Problems -- PART TWO: ASYMMETRIC CIPHERS -- Chapter 8 More Number Theory -- 8.1 Prime Numbers -- 8.2 Fermat's and Euler's Theorems -- 8.3 Testing for Primality -- 8.4 The Chinese Remainder Theorem -- 8.5 Discrete Logarithms -- 8.6 Recommended Reading and Web Sites -- 8.7 Key Terms, Review Questions, and Problems -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Recommended Reading and Web Sites -- 9.4 Key Terms, Review Questions, and Problems -- Appendix 9A: Proof of the RSA Algorithm -- Appendix 9B: The Complexity of Algorithms -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 ElGamal Cryptosystem -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Recommended Reading and Web Sites -- 10.7 Key Terms, Review Questions, and Problems -- PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Recommended Reading and Web Sites -- 11.8 Key Terms, Review Questions, and Problems -- Appendix 11A: Mathematical Basis of Birthday Attack -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.9 Recommended Reading -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 ElGamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 Digital Signature Standard (DSS) -- 13.5 Recommended Reading and Web Sites -- 13.6 Key Terms, Review Questions, and Problems -- PART FOUR: MUTUAL TRUST -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public Key Infrastructure -- 14.6 Recommended Reading and Web Sites -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication Protocols -- 15.1 Remote User Authentication Principles -- 15.2 Remote User Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Recommended Reading and Web Sites -- 15.7 Key Terms, Review Questions, and Problems -- Appendix 15A: Kerberos Encryption Techniques.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note PART FIVE: NETWORK AND INTERNET SECURITY -- Chapter 16 Transport-Level Security -- 16.1 Web Security Issues -- 16.2 Secure Sockets Layer (SSL) -- 16.3 Transport Layer Security (TLS) -- 16.4 HTTPS -- 16.5 Secure Shell (SSH) -- 16.6 Recommended Reading and Web Sites -- 16.7 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Network Security -- 17.1 IEEE 802.11 Wireless LAN Overview -- 17.2 IEEE 802.11i Wireless LAN Security -- 17.3 Wireless Application Protocol Overview -- 17.4 Wireless Transport Layer Security -- 17.5 WAP End-to-End Security -- 17.6 Recommended Reading and Web Sites -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Electronic Mail Security -- 18.1 Pretty Good Privacy (PGP) -- 18.2 S/MIME -- 18.3 DomainKeys Identified Mail (DKIM) -- 18.4 Recommended Web Sites -- 18.5 Key Terms, Review Questions, and Problems -- Appendix 18A: Radix-64 Conversion -- Chapter 19 IP Security -- 19.1 IP Security Overview -- 19.2 IP Security Policy -- 19.3 Encapsulating Security Payload -- 19.4 Combining Security Associations -- 19.5 Internet Key Exchange -- 19.6 Cryptographic Suites -- 19.7 Recommended Reading and Web Sites -- 19.8 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A: Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Writing Assignments -- A.9 Reading/Report Assignments -- Appendix B: Sage Examples -- B.1 Chapter 2: Classical Encryption Techniques -- B.2 Chapter 3: Block Ciphers and the Data Encryption Standard -- B.3 Chapter 4: Basic Concepts in Number Theory and Finite Fields -- B.4 Chapter 5: Advanced Encryption Standard.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note B.5 Chapter 6: Pseudorandom Number Generation and Stream Ciphers -- B.6 Chapter 8: Number Theory -- B.6 Chapter 9: Public-Key Cryptography and RSA -- B.7 Chapter 10: Other Public-Key Cryptosystems -- B.8 Chapter 11: Cryptographic Hash Functions -- B.9 Chapter 13: Digital Signatures -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- PART SIX: SYSTEM SECURITY -- Chapter 20 Intruders -- 20.1 Intruders -- 20.2 Intrusion Detection -- 20.3 Password Management -- 20.4 Recommended Reading and Web Sites -- 20.5 Key Terms, Review Questions, and Problems -- Appendix 20A: The Base-Rate Fallacy -- Chapter 21 Malicious Software -- 21.1 Types of Malicious Software -- 21.2 Viruses -- 21.3 Virus Countermeasures -- 21.4 Worms -- 21.5 Distributed Denial of Service Attacks -- 21.6 Recommended Reading and Web Sites -- 21.7 Key Terms, Review Questions, and Problems -- Chapter 22 Firewalls -- 22.1 The Need for Firewalls -- 22.2 Firewall Characteristics -- 22.3 Types of Firewalls -- 22.4 Firewall Basing -- 22.5 Firewall Location and Configurations -- 22.6 Recommended Reading and Web Sites -- 22.7 Key Terms, Review Questions, and Problems -- PART SEVEN: LEGAL AND ETHICAL ISSUES -- Chapter 23 Legal and Ethical Issues -- 23.1 Cybercrime and Computer Crime -- 23.2 Intellectual Property -- 23.3 Privacy -- 23.4 Ethical Issues -- 23.5 Recommended Reading and Web Sites -- 23.6 Key Terms, Review Questions, and Problems -- Appendix C: Sage Problems -- C.1 Getting Started with Sage -- C.2 Programming with Sage -- C.3 Chapter 2: Classical Encryption Techniques -- C.4 Chapter 3: Block Ciphers and the Data Encryption Standard -- C.5 Chapter 4: Basic Concepts in Number Theory and Finite Fields -- C.6 Chapter 5: Advanced Encryption Standard.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note C.7 Chapter 7: Pseudorandom Number Generation and Stream Ciphers.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Stallings, William
Title Cryptography and Network Security: Principles and Practice
Place, publisher, and date of publication : Pearson India,c2010
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127075">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127075</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Online Access     CENTRAL LIBRARY Digital Library Digital Library 07/01/2019   005.82 STA-C5 E0142 07/01/2019 07/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery