Cryptography and network security: principles and practices
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, N.J.
Pearson Prentice Hall
2006
|
Ausgabe: | 4. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVI, 680 S. graph. Darst. |
ISBN: | 0131873164 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021319587 | ||
003 | DE-604 | ||
005 | 20060301 | ||
007 | t | ||
008 | 060202s2006 d||| |||| 00||| eng d | ||
020 | |a 0131873164 |9 0-13-187316-4 | ||
035 | |a (OCoLC)63126393 | ||
035 | |a (DE-599)BVBBV021319587 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-739 |a DE-29T |a DE-634 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
100 | 1 | |a Stallings, William |d 1945- |e Verfasser |0 (DE-588)130436461 |4 aut | |
245 | 1 | 0 | |a Cryptography and network security |b principles and practices |c William Stallings |
250 | |a 4. ed. | ||
264 | 1 | |a Upper Saddle River, N.J. |b Pearson Prentice Hall |c 2006 | |
300 | |a XVI, 680 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Cryptographie - Réseaux d'ordinateurs | |
650 | 4 | |a Cryptographie à clé publique | |
650 | 4 | |a Réseaux d'ordinateurs - Sécurité - Mesures | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014640010&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014640010 |
Datensatz im Suchindex
_version_ | 1804135127620517888 |
---|---|
adam_text | Contents
Notation xi
Preface
Chapter
0.1
0.2
0.3
Chapter
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
PART ONE SYMMETRIC CIPHERS
Chapter
2.1
2.2
2.3
2.4
2.5
2.6
2.7
Chapter
3.1
3.2
3.3
3.4
3.5
3.6
3.7
Chapter
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
Chapter
5.1
5.2
5.3
5.4
Appendix 5A Polynomials with Coefficients in GF(2
Appendix 5B Simplified AES
Chapter
6.1
6.2
6.3
6.4
6.5
Chapter
7.1
7.2
7.3
7.4
7.5
7.6
PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS
Chapter
8.1
8.2
8.3
8.4
8.5
8.6
8.7
Chapter
9.1
9.2
9.3
9.4
Appendix 9A Proof of the RSA Algorithm
Appendix 9B The Complexity of Algorithms
Chapter
10.1
10.2
10.3
10.4
10.5
10.6
Chapter
11.1
11.2
11.3
11.4
11.5
11.6
11.7
Appendix 11A Mathematical Basis of the Birthday Attack
Chapter
12.1
12.2
12.3
12.4
12.5
12.6
Chapter
13.1
13.2
13.3
13.4
13.5
PART THREE NETWORK SECURITY APPLICATIONS
Chapter
14.1 Kerberos 401
14.2
14.3
14.4
14.5
Appendix 14A
Chapter
15.1
15.2
15.3
15.4
Appendix 15A Data Compression Using ZIP
Appendix 15B Radix-64 Conversion
Appendix 15C PGP Random Number Generation
Chapter
16.1
16.2
16.3
16.4
16.5
16.6
16.7
16.8
Appendix 16A Internetworking and Internet Protocols
Chapter
17.1
17.2
17.3
17.4
17.5
PART FOUR SYSTEM SECURITY
Chapter
18.1
18.2
18.3
18.4
18.5
Appendix 18A The Base-Rate Fallacy
Chapter
19.1
19.2
19.3
19.4
19.5
Chapter
20.1
20.2
20.3
20.3
20.4
APPENDICES
Appendix A Standards and Standards-Setting Organizations
A.I The Importance of Standards
A.
A.3 National Institute of Standards and Technology
Appendix
B.I Research Projects
B.2 Programming Projects
B.3 Laboratory Exercises
B.4
В.
Glossary
References
Index
|
adam_txt |
Contents
Notation xi
Preface
Chapter
0.1
0.2
0.3
Chapter
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
PART ONE SYMMETRIC CIPHERS
Chapter
2.1
2.2
2.3
2.4
2.5
2.6
2.7
Chapter
3.1
3.2
3.3
3.4
3.5
3.6
3.7
Chapter
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
Chapter
5.1
5.2
5.3
5.4
Appendix 5A Polynomials with Coefficients in GF(2
Appendix 5B Simplified AES
Chapter
6.1
6.2
6.3
6.4
6.5
Chapter
7.1
7.2
7.3
7.4
7.5
7.6
PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS
Chapter
8.1
8.2
8.3
8.4
8.5
8.6
8.7
Chapter
9.1
9.2
9.3
9.4
Appendix 9A Proof of the RSA Algorithm
Appendix 9B The Complexity of Algorithms
Chapter
10.1
10.2
10.3
10.4
10.5
10.6
Chapter
11.1
11.2
11.3
11.4
11.5
11.6
11.7
Appendix 11A Mathematical Basis of the Birthday Attack
Chapter
12.1
12.2
12.3
12.4
12.5
12.6
Chapter
13.1
13.2
13.3
13.4
13.5
PART THREE NETWORK SECURITY APPLICATIONS
Chapter
14.1 Kerberos 401
14.2
14.3
14.4
14.5
Appendix 14A
Chapter
15.1
15.2
15.3
15.4
Appendix 15A Data Compression Using ZIP
Appendix 15B Radix-64 Conversion
Appendix 15C PGP Random Number Generation
Chapter
16.1
16.2
16.3
16.4
16.5
16.6
16.7
16.8
Appendix 16A Internetworking and Internet Protocols
Chapter
17.1
17.2
17.3
17.4
17.5
PART FOUR SYSTEM SECURITY
Chapter
18.1
18.2
18.3
18.4
18.5
Appendix 18A The Base-Rate Fallacy
Chapter
19.1
19.2
19.3
19.4
19.5
Chapter
20.1
20.2
20.3
20.3
20.4
APPENDICES
Appendix A Standards and Standards-Setting Organizations
A.I The Importance of Standards
A.
A.3 National Institute of Standards and Technology
Appendix
B.I Research Projects
B.2 Programming Projects
B.3 Laboratory Exercises
B.4
В.
Glossary
References
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Stallings, William 1945- |
author_GND | (DE-588)130436461 |
author_facet | Stallings, William 1945- |
author_role | aut |
author_sort | Stallings, William 1945- |
author_variant | w s ws |
building | Verbundindex |
bvnumber | BV021319587 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
classification_tum | DAT 465f DAT 461f |
ctrlnum | (OCoLC)63126393 (DE-599)BVBBV021319587 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 4. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02097nam a2200541 c 4500</leader><controlfield tag="001">BV021319587</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060301 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060202s2006 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0131873164</subfield><subfield code="9">0-13-187316-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)63126393</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021319587</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stallings, William</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130436461</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and network security</subfield><subfield code="b">principles and practices</subfield><subfield code="c">William Stallings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Pearson Prentice Hall</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 680 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie - Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie à clé publique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014640010&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014640010</subfield></datafield></record></collection> |
id | DE-604.BV021319587 |
illustrated | Illustrated |
index_date | 2024-07-02T13:58:32Z |
indexdate | 2024-07-09T20:35:34Z |
institution | BVB |
isbn | 0131873164 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014640010 |
oclc_num | 63126393 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-739 DE-29T DE-634 |
owner_facet | DE-91G DE-BY-TUM DE-739 DE-29T DE-634 |
physical | XVI, 680 S. graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Pearson Prentice Hall |
record_format | marc |
spelling | Stallings, William 1945- Verfasser (DE-588)130436461 aut Cryptography and network security principles and practices William Stallings 4. ed. Upper Saddle River, N.J. Pearson Prentice Hall 2006 XVI, 680 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Chiffrement (Informatique) Cryptographie - Réseaux d'ordinateurs Cryptographie à clé publique Réseaux d'ordinateurs - Sécurité - Mesures Coding theory Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Internet (DE-588)4308416-3 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014640010&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stallings, William 1945- Cryptography and network security principles and practices Chiffrement (Informatique) Cryptographie - Réseaux d'ordinateurs Cryptographie à clé publique Réseaux d'ordinateurs - Sécurité - Mesures Coding theory Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4308416-3 (DE-588)4033329-2 |
title | Cryptography and network security principles and practices |
title_auth | Cryptography and network security principles and practices |
title_exact_search | Cryptography and network security principles and practices |
title_exact_search_txtP | Cryptography and network security principles and practices |
title_full | Cryptography and network security principles and practices William Stallings |
title_fullStr | Cryptography and network security principles and practices William Stallings |
title_full_unstemmed | Cryptography and network security principles and practices William Stallings |
title_short | Cryptography and network security |
title_sort | cryptography and network security principles and practices |
title_sub | principles and practices |
topic | Chiffrement (Informatique) Cryptographie - Réseaux d'ordinateurs Cryptographie à clé publique Réseaux d'ordinateurs - Sécurité - Mesures Coding theory Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Chiffrement (Informatique) Cryptographie - Réseaux d'ordinateurs Cryptographie à clé publique Réseaux d'ordinateurs - Sécurité - Mesures Coding theory Computer networks Security measures Computer security Data encryption (Computer science) Computersicherheit Rechnernetz Internet Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014640010&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stallingswilliam cryptographyandnetworksecurityprinciplesandpractices |