| 000 | 02618cam a22003258i 4500 | ||
|---|---|---|---|
| 999 |
_c94637 _d94637 |
||
| 005 | 20260306150055.0 | ||
| 008 | 230104s2024 nju b 001 0 eng | ||
| 010 | _a 2023000040 | ||
| 020 | _a9781292473291 | ||
| 041 | _aeng | ||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bS685 2024 |
| 082 | 0 | 0 |
_a005.8 _223/eng/20230109 |
| 100 | 1 |
_aStallings, William, _eauthor. |
|
| 245 | 1 | 0 |
_aComputer security : _bprinciples and practice / _cWilliam Stallings, Lawrie Brown, UNSW Canberra at the Australian Defence Force Academy. |
| 250 | _aFifth edition. | ||
| 264 | 1 |
_aHarlow, Essex : _bPearson Education limited, _c[2024] |
|
| 264 | 4 | _c©2024. | |
| 300 |
_a994 pages : _bilustrations ; _c23 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _8Overview Cryptographic Tools User Authentication Access Control Database and Data Center Security Malicious Software Denial-of-Service Attacs Intrusion Detection Firewalls and Intrusion Prevention Systems Buffer Overflow Software Security Operating Systems Security Cloud and IoT Security IT Security Management and Risk Assessment IT Security Controls, plans, and Procedures Physical and Infrastructure Security Human Resources Security Security Auiditing Legal and Ethical Aspects Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Internet Security Protocols and Standards Internet Authentication Applications Wireless Network Security APPENDICES Projects and Other Student Exercises for Teaching Computer Security Some Aspects of Number Theory Standards and Standard-Setting Organizations Random and Pseudorandom Number Generation Message Authentication Codes Based on Block Ciphers The TCP/IP Protocol Architecture Radix-64 Conversion The Domain Name System The Base Rate Fallacy SHA-3 814 Glossary | |
| 520 |
_a"Since the fourth edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field. There have been a number of refinements to improve pedagogy and user-friendliness, updated references, and mention of recent security incidents, along with a number of more substantive changes throughout the book"-- _cProvided by publisher. |
||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 700 | 1 |
_aBrown, Lawrie, _eauthor. |
|
| 942 |
_2ddc _cBK |
||