Cryptography and network security: principles and practice (Record no. 249)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01535nam a2200241Ia 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250730165044.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250728s9999 xx 000 0 und d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 978-0-13-705632-3 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | C 005.8 St9c |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Stallings, William |
| 245 #0 - TITLE STATEMENT | |
| Title | Cryptography and network security: principles and practice |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 5th ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Upper Saddle River, NJ |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | Perason Prentice Hall |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Date of publication, distribution, etc. | 2011 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 746 p. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Other physical details | Includes references |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | In this age of universal electronic connectivity, of viruses and hackers, of electronic eaves-dropping and electronic fraud, there is indeed no time at which security does not matter. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communi-cated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks-securty measures |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security(computer science) |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Data encryption |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| PCC | PCC | CIRCULATION | 07/30/2025 | C 005.8 St9c | 5160 | 07/30/2025 | 07/30/2025 | Book |