Network security essentials: applications and standards
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ
Prentice-Hall
2007
|
Ausgabe: | 3. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVI, 413 S. Ill., graph. Darst. |
ISBN: | 0132380331 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021530998 | ||
003 | DE-604 | ||
005 | 20200303 | ||
007 | t | ||
008 | 060329s2007 xxuad|| |||| 00||| eng d | ||
020 | |a 0132380331 |9 0-13-238033-1 | ||
035 | |a (OCoLC)70403041 | ||
035 | |a (DE-599)BVBBV021530998 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 |a DE-703 |a DE-188 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Stallings, William |d 1945- |e Verfasser |0 (DE-588)130436461 |4 aut | |
245 | 1 | 0 | |a Network security essentials |b applications and standards |c William Stallings |
250 | |a 3. ed. | ||
264 | 1 | |a Upper Saddle River, NJ |b Prentice-Hall |c 2007 | |
300 | |a XVI, 413 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 1 | 1 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 1 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014747341&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014747341 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135277487194112 |
---|---|
adam_text | Contents
Preface
Chapter
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
1.11
PART ONE CRYPTOGRAPHY
Chapter
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
Chapter
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
PART TWO NETWORK SECURITY APPLICATIONS
Chapter
4.1 Kerberos 95
4.2
4.3
X
4.4
4.4
Appendix
Chapter
5.1
5.2
5.3
5.4
Appendix
Appendix 5B: Radix-64 Conversion
Appendix 5C: PGP Random Number Generation
Chapter
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
Appendix 6A: Internetworking and Internet Protocols
Chapter
7.1
7.2
7.3
7.4
7.5
Chapter
8.1
8.2
8.3
8.4
8.5
PART THREE SYSTEM SECURITY
Chapter
9.1
9.2
9.3
9.4
9.5
Appendix 9A:The Base-Rate Fallacy
CONTENTS Xl
Chapter
10.1
10.2
10.3
10.4
10.5
Chapter
11.1
11.2
11.3
11.4
11.5
APPENDICES
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbers
A.2 Modular Arithmetic
Appendix
B.1 Research Projects
B.2 Programming Projects
B.3 Laboratory Exercises
B.4 Writing Assignments
B.5 Reading/Report Assignments
Glossary
References
Index
|
adam_txt |
Contents
Preface
Chapter
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
1.11
PART ONE CRYPTOGRAPHY
Chapter
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
Chapter
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
PART TWO NETWORK SECURITY APPLICATIONS
Chapter
4.1 Kerberos 95
4.2
4.3
X
4.4
4.4
Appendix
Chapter
5.1
5.2
5.3
5.4
Appendix
Appendix 5B: Radix-64 Conversion
Appendix 5C: PGP Random Number Generation
Chapter
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
Appendix 6A: Internetworking and Internet Protocols
Chapter
7.1
7.2
7.3
7.4
7.5
Chapter
8.1
8.2
8.3
8.4
8.5
PART THREE SYSTEM SECURITY
Chapter
9.1
9.2
9.3
9.4
9.5
Appendix 9A:The Base-Rate Fallacy
CONTENTS Xl
Chapter
10.1
10.2
10.3
10.4
10.5
Chapter
11.1
11.2
11.3
11.4
11.5
APPENDICES
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbers
A.2 Modular Arithmetic
Appendix
B.1 Research Projects
B.2 Programming Projects
B.3 Laboratory Exercises
B.4 Writing Assignments
B.5 Reading/Report Assignments
Glossary
References
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Stallings, William 1945- |
author_GND | (DE-588)130436461 |
author_facet | Stallings, William 1945- |
author_role | aut |
author_sort | Stallings, William 1945- |
author_variant | w s ws |
building | Verbundindex |
bvnumber | BV021530998 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 ST 276 |
ctrlnum | (OCoLC)70403041 (DE-599)BVBBV021530998 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 3. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02092nam a2200529zc 4500</leader><controlfield tag="001">BV021530998</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200303 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060329s2007 xxuad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0132380331</subfield><subfield code="9">0-13-238033-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70403041</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021530998</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stallings, William</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130436461</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security essentials</subfield><subfield code="b">applications and standards</subfield><subfield code="c">William Stallings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Prentice-Hall</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 413 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014747341&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014747341</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV021530998 |
illustrated | Illustrated |
index_date | 2024-07-02T14:25:20Z |
indexdate | 2024-07-09T20:37:57Z |
institution | BVB |
isbn | 0132380331 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014747341 |
oclc_num | 70403041 |
open_access_boolean | |
owner | DE-739 DE-703 DE-188 |
owner_facet | DE-739 DE-703 DE-188 |
physical | XVI, 413 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Prentice-Hall |
record_format | marc |
spelling | Stallings, William 1945- Verfasser (DE-588)130436461 aut Network security essentials applications and standards William Stallings 3. ed. Upper Saddle River, NJ Prentice-Hall 2007 XVI, 413 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Computer security Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Netzwerk (DE-588)4171529-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Netzwerk (DE-588)4171529-9 s Datenverarbeitung (DE-588)4011152-0 s Sicherheit (DE-588)4054790-5 s 1\p DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014747341&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Stallings, William 1945- Network security essentials applications and standards Computer networks Security measures Computer security Datenverarbeitung (DE-588)4011152-0 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Sicherheit (DE-588)4054790-5 gnd Netzwerk (DE-588)4171529-9 gnd |
subject_GND | (DE-588)4011152-0 (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4054790-5 (DE-588)4171529-9 |
title | Network security essentials applications and standards |
title_auth | Network security essentials applications and standards |
title_exact_search | Network security essentials applications and standards |
title_exact_search_txtP | Network security essentials applications and standards |
title_full | Network security essentials applications and standards William Stallings |
title_fullStr | Network security essentials applications and standards William Stallings |
title_full_unstemmed | Network security essentials applications and standards William Stallings |
title_short | Network security essentials |
title_sort | network security essentials applications and standards |
title_sub | applications and standards |
topic | Computer networks Security measures Computer security Datenverarbeitung (DE-588)4011152-0 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Sicherheit (DE-588)4054790-5 gnd Netzwerk (DE-588)4171529-9 gnd |
topic_facet | Computer networks Security measures Computer security Datenverarbeitung Computersicherheit Rechnernetz Sicherheit Netzwerk |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014747341&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stallingswilliam networksecurityessentialsapplicationsandstandards |