Cryptography and network security: principles and practice
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston
Pearson Education Limited
[2017]
|
Ausgabe: | Seventh edition, global edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke Literaturverzeichnis Seite 744-752 |
Beschreibung: | 766 Seiten Illustrationen, Diagramme |
ISBN: | 9781292158587 1292158581 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | BV043529690 | ||
003 | DE-604 | ||
005 | 20181126 | ||
007 | t | ||
008 | 160427s2017 a||| |||| 00||| eng d | ||
010 | |a 2015051130 | ||
020 | |a 9781292158587 |9 978-1-292-15858-7 | ||
020 | |a 1292158581 |9 1-292-15858-1 | ||
035 | |a (OCoLC)961697407 | ||
035 | |a (DE-599)BSZ456391428 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-91G |a DE-83 |a DE-573 |a DE-29T |a DE-2070s |a DE-739 |a DE-20 |a DE-1050 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.82 | |
082 | 0 | |a 005.8/2 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Stallings, William |d 1945- |e Verfasser |0 (DE-588)130436461 |4 aut | |
245 | 1 | 0 | |a Cryptography and network security |b principles and practice |c William Stallings |
250 | |a Seventh edition, global edition | ||
264 | 1 | |a Boston |b Pearson Education Limited |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 766 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
500 | |a Literaturverzeichnis Seite 744-752 | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028945424&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-028945424 |
Datensatz im Suchindex
_version_ | 1804176180806418432 |
---|---|
adam_text | Titel: Cryptography and network security
Autor: Stallings, William
Jahr: 2017
Contents
Notation 10
Preface 12
About the Author 18
PART ONE: BACKGROUND 19
Chapter 1 Computer and Network Security Concepts 19
1.1 Computer Security Concepts 21
1.2 The OSI Security Architecture 26
1.3 Security Attacks 27
1.4 Security Services 29
1.5 Security Mechanisms 32
1.6 Fundamental Security Design Principles 34
1.7 Attack Surfaces and Attack Trees 37
1.8 A Model for Network Security 41
1.9 Standards 43
1.10 Key Terms, Review Questions, and Problems 44
Chapter 2 Introduction to Number Theory 46
2.1 Divisibility and the Division Algorithm 47
2.2 The Euclidean Algorithm 49
2.3 Modular Arithmetic 53
2.4 Prime Numbers 61
2.5 Fermat s and Euler s Theorems 64
2.6 Testing for Primality 68
2.7 The Chinese Remainder Theorem 71
2.8 Discrete Logarithms 73
2.9 Key Terms, Review Questions, and Problems 78
Appendix 2A The Meaning of Mod 82
PART TWO: SYMMETRIC CIPHERS 85
Chapter 3 Classical Encryption Techniques 85
3.1 Symmetric Cipher Model 86
3.2 Substitution Techniques 92
3.3 Transposition Techniques 107
3.4 Rotor Machines 108
3.5 Steganography 110
3.6 Key Terms, Review Questions, and Problems 112
Chapter 4 Block Ciphers and the Data Encryption Standard 118
4.1 Traditional Block Cipher Structure 119
4.2 The Data Encryption Standard 129
4.3 A DES Example 131
4.4 The Strength of DES 134
4 CONTENTS
4.5
4.6
Chapter 5
5.1
5.2
5.3
5.4
5.5
5.6
5.7
Chapter (
6.1
6.2
6.3
6.4
6.5
6.6
6.7
Chapter 7
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9
Chapter 8
8.1
8.2
8.3
8.4
8.5
8.6
8.7
Block Cipher Design Principles 135
Key Terms, Review Questions, and Problems 137
Finite Fields 141
Groups 143
Rings 145
Fields 146
Finite Fields of the Form GF(p) 147
Polynomial Arithmetic 151
Finite Fields of the Form GF(2 ) 157
Key Terms, Review Questions, and Problems 169
Advanced Encryption Standard 171
Finite Field Arithmetic 172
AES Structure 174
AES Transformation Functions 179
AES Key Expansion 190
An AES Example 193
AES Implementation 197
Key Terms, Review Questions, and Problems 202
Appendix 6A Polynomials with Coefficients in GF(28) 203
Block Cipher Operation 207
Multiple Encryption and Triple DES 208
Electronic Codebook 213
Cipher Block Chaining Mode 216
Cipher Feedback Mode 218
Output Feedback Mode 220
Counter Mode 222
XTS-AES Mode for Block-Oriented Storage Devices 224
Format-Preserving Encryption 231
Key Terms, Review Questions, and Problems 245
Random Bit Generation and Stream Ciphers 250
Principles of Pseudorandom Number Generation 252
Pseudorandom Number Generators 258
Pseudorandom Number Generation Using a Block Cipher 261
Stream Ciphers 267
RC4 269
True Random Number Generators 271
Key Terms, Review Questions, and Problems 280
PART THREE: ASYMMETRIC CIPHERS 283
Chapter 9 Public-Key Cryptography and RSA 283
9.1 Principles ot Public-Key Cryptosystenrs 285
9.2 The RSA Algorithm 294
9.3 Key Terms, Review Questions, and Problems 308
CON S !¦¦ N I S 5
Chapter 10 Other Public-Key Cryptosystems 313
10.1 Diffie-Hellnian Key Exchange 314
10.2 Elgamal Cryptographic System 318
10.3 Elliptic Curve Arithmetic 321
10.4 Elliptic Curve Cryptography 330
10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher 334
10.6 Key Terms, Review Questions, and Problems 336
PART FOUR: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS 339
Chapter 11 Cryptographic Hash Functions 339
11.1 Applications of Cryptographic Hash Functions 341
11.2 Two Simple Hash Functions 346
11.3 Requirements and Security 348
11.4 Hash Functions Based on Cipher Block Chaining 354
11.5 Secure Hash Algorithm (SHA) 355
11.6 SHA-3 365
11.7 Key Terms, Review Questions, and Problems 377
Chapter 12 Message Authentication Codes 381
12.1 Message Authentication Requirements 382
12.2 Message Authentication Functions 383
12.3 Requirements for Message Authentication Codes 391
12.4 Security of MACs 393
12.5 MACs Based on Hash Functions: HMAC 394
12.6 MACs Based on Block Ciphers: DAA and CMAC 399
12.7 Authenticated Encryption: CCM and GCM 402
12.8 Key Wrapping 408
12.9 Pseudorandom Number Generation Using Hash Functions and MACs 413
12.10 Key Terms, Review Questions, and Problems 416
Chapter 13 Digital Signatures 419
13.1 Digital Signatures 421
13.2 Elgamal Digital Signature Scheme 424
13.3 Schnorr Digital Signature Scheme 425
13.4 NIST Digital Signature Algorithm 426
13.5 Elliptic Curve Digital Signature Algorithm 430
13.6 RSA-PSS Digital Signature Algorithm 433
13.7 Key Terms, Review Questions, and Problems 438
PART FIVE: MUTUAL TRUST 441
Chapter 14 Key Management and Distribution 441
14.1 Symmetric Key Distribution Using Symmetric Encryption 442
14.2 Symmetric Key Distribution Using Asymmetric Encryption 451
14.3 Distribution of Public Keys 454
14.4 X.509 Certificates 459
6 CONTENTS
14.5 Public-Key Infrastructure 467
14.6 Key Terms, Review Questions, and Problems 469
Chapter 15 User Authentication 473
15.1 Remote User-Authentication Principles 474
15.2 Remote User-Authentication Using Symmetric Encryption 478
15.3 Kerberos 482
15.4 Remote User-Authentication Using Asymmetric Encryption 500
15.5 Federated Identity Management 502
15.6 Personal Identity Verification 508
15.7 Key Terms, Review Questions, and Problems 515
PART SIX: NETWORK AND INTERNET SECURITY 519
Chapter 16 Network Access Control and Cloud Security 519
16.1 Network Access Control 520
16.2 Extensible Authentication Protocol 523
16.3 IEEE 802.IX Port-Based Network Access Control 527
16.4 Cloud Computing 529
16.5 Cloud Security Risks and Countermeasures 535
16.6 Data Protection in the Cloud 537
16.7 Cloud Security as a Service 541
16.8 Addressing Cloud Computing Security Concerns 544
16.9 Key Terms, Review Questions, and Problems 545
Chapter 17 Transport-Level Security 546
17.1 Web Security Considerations 547
17.2 Transport Layer Security 549
17.3 HTTPS 566
17.4 Secure Shell (SSH) 567
17.5 Key Terms, Review Questions, and Problems 579
Chapter 18 Wireless Network Security 581
18.1 Wireless Security 582
18.2 Mobile Device Security 585
18.3 IEEE 802.11 Wireless LAN Overview 589
18.4 IEEE 802.lli Wireless LAN Security 595
18.5 Key Terms, Review Questions, and Problems 610
Chapter 19 Electronic Mail Security 612
19.1 Internet Mail Architecture 613
19.2 Email Formats 617
Email Threats and Comprehensive Email Security 625
19.3
19.4 S/MIME 627
19.5 Pretty Good Privacy 638
19.6 DNSSEC 639
!o I !)N^HaSCd Authc «cation of Named Entities 643
Sender Policy Framework 645
19.9 DomainKeys Identified Mail 648
CONTENTS 7
19.10 Domain-Based Message Authentication, Reporting, and Conformance 654
19.11 Key Terms, Review Questions, and Problems 659
Chapter 20 IP Security 661
20.1 IP Security Overview 662
20.2 IP Security Policy 668
20.3 Encapsulating Security Payload 673
20.4 Combining Security Associations 681
20.5 Internet Key Exchange 684
20.6 Cryptographic Suites 692
20.7 Key Terms, Review Questions, and Problems 694
APPENDICES 696
Appendix A Projects for Teaching Cryptography and Network Security 696
A.l Sage Computer Algebra Projects 697
A.2 Hacking Project 698
A.3 Block Cipher Projects 699
A.4 Laboratory Exercises 699
A.5 Research Projects 699
A.6 Programming Projects 700
A.7 Practical Security Assessments 700
A.8 Firewall Projects 701
A.9 Case Studies 701
A.10 Writing Assignments 701
A.ll Reading/Report Assignments 702
A. 12 Discussion Topics 702
Appendix B Sage Examples 703
B.l Linear Algebra and Matrix Functionality 704
B.2 Chapter 2: Number Theory 705
B.3 Chapter 3: Classical Encryption 710
B.4 Chapter 4: Block Ciphers and the Data Encryption Standard 713
B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields 717
B.6 Chapter 6: Advanced Encryption Standard 724
B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers 729
B.8 Chapter 9: Public-Key Cryptography and RSA 731
B.9 Chapter 10: Other Public-Key Cryptosystems 734
B.10 Chapter 11: Cryptographic Hash Functions 739
B.ll Chapter 13: Digital Signatures 741
References 744
Credits 753
Index 754
|
any_adam_object | 1 |
author | Stallings, William 1945- |
author_GND | (DE-588)130436461 |
author_facet | Stallings, William 1945- |
author_role | aut |
author_sort | Stallings, William 1945- |
author_variant | w s ws |
building | Verbundindex |
bvnumber | BV043529690 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)961697407 (DE-599)BSZ456391428 |
dewey-full | 005.82 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 005.8/2 |
dewey-search | 005.82 005.8/2 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Seventh edition, global edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02190nam a22005652c 4500</leader><controlfield tag="001">BV043529690</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181126 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160427s2017 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2015051130</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781292158587</subfield><subfield code="9">978-1-292-15858-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1292158581</subfield><subfield code="9">1-292-15858-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)961697407</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ456391428</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-2070s</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stallings, William</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130436461</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and network security</subfield><subfield code="b">principles and practice</subfield><subfield code="c">William Stallings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Seventh edition, global edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Pearson Education Limited</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">766 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverzeichnis Seite 744-752</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028945424&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028945424</subfield></datafield></record></collection> |
id | DE-604.BV043529690 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:28:05Z |
institution | BVB |
isbn | 9781292158587 1292158581 |
language | English |
lccn | 2015051130 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028945424 |
oclc_num | 961697407 |
open_access_boolean | |
owner | DE-634 DE-91G DE-BY-TUM DE-83 DE-573 DE-29T DE-2070s DE-739 DE-20 DE-1050 |
owner_facet | DE-634 DE-91G DE-BY-TUM DE-83 DE-573 DE-29T DE-2070s DE-739 DE-20 DE-1050 |
physical | 766 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Pearson Education Limited |
record_format | marc |
spelling | Stallings, William 1945- Verfasser (DE-588)130436461 aut Cryptography and network security principles and practice William Stallings Seventh edition, global edition Boston Pearson Education Limited [2017] © 2017 766 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Hier auch später erschienene, unveränderte Nachdrucke Literaturverzeichnis Seite 744-752 Computer networks / Security measures Data encryption (Computer science) Coding theory Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Internet (DE-588)4308416-3 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028945424&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stallings, William 1945- Cryptography and network security principles and practice Computer networks / Security measures Data encryption (Computer science) Coding theory Computer security Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4308416-3 (DE-588)4033329-2 |
title | Cryptography and network security principles and practice |
title_auth | Cryptography and network security principles and practice |
title_exact_search | Cryptography and network security principles and practice |
title_full | Cryptography and network security principles and practice William Stallings |
title_fullStr | Cryptography and network security principles and practice William Stallings |
title_full_unstemmed | Cryptography and network security principles and practice William Stallings |
title_short | Cryptography and network security |
title_sort | cryptography and network security principles and practice |
title_sub | principles and practice |
topic | Computer networks / Security measures Data encryption (Computer science) Coding theory Computer security Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer networks / Security measures Data encryption (Computer science) Coding theory Computer security Computersicherheit Rechnernetz Internet Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028945424&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stallingswilliam cryptographyandnetworksecurityprinciplesandpractice |