Henkilönnimi Stallings, William, kirjoittaja.
Nimeke- ja vastuullisuusmerkintö Cryptography and network security : principles and practice
Julkaistu Pearson Education Limited, Harlow, United Kingdom : [2022]
©2023
UDK-luokituskoodi
Painos Eighth edition, Global edition.
Ulkoasutiedot
Asiasana
ISBN
*00002832cam a22006134i 4500
*00111551
*00520221103173625.0
*008220914t20222023xxka 001 0|eng|c
*020 $a978-1-292-43748-4$c93,42$qpehmeäkantinen
*035 $aFI-Xamk
*035 $a(FI-MELINDA)018333518
*040 $bmul$erda
*0410 $aeng
*0801 $a004$21995
*1001 $aStallings, William,$ekirjoittaja.
*24510$aCryptography and network security :$bprinciples and practice /$cWilliam Stallings.
*250 $aEighth edition, Global edition.
*260 $aHarlow$bPearson Education,$c2023
*264 1$aHarlow, United Kingdom :$bPearson Education Limited,$c[2022]
*264 4$c©2023
*300 $a832 sivua :$bkuvitettu
*336 $ateksti$btxt$2rdacontent
*337 $akäytettävissä ilman laitetta$bn$2rdamedia
*338 $anide$bnc$2rdacarrier
*504 $aIncludes bibliographical references and index.
*650 0$aCryptography.
*650 0$aData encryption (Computer science)
*650 0$aComputer networks$xSecurity measures.
*650 0$aCoding theory.
*650 0$aInformation networks.
*650 7$akryptografia$2yso/fin$0http://www.yso.fi/onto/yso/p5480
*650 7$atietoturva$2yso/fin$0http://www.yso.fi/onto/yso/p5479
*650 7$atietoliikenneverkot$2yso/fin$0http://www.yso.fi/onto/yso/p1957
*650 7$atietosuoja$2yso/fin$0http://www.yso.fi/onto/yso/p3636
*650 7$atietoverkot$2yso/fin$0http://www.yso.fi/onto/yso/p12936
*650 7$asuojaus$2yso/fin$0http://www.yso.fi/onto/yso/p3601
*650 7$asalaus$2yso/fin$0http://www.yso.fi/onto/yso/p5475
*650 7$aalgoritmit$2yso/fin$0http://www.yso.fi/onto/yso/p14524
*650 7$alangattomat verkot$2yso/fin$0http://www.yso.fi/onto/yso/p24221
*650 7$asähköposti$2yso/fin$0http://www.yso.fi/onto/yso/p16666
*650 7$apilvipalvelut$2yso/fin$0http://www.yso.fi/onto/yso/p24167
*650 7$aesineiden internet$2yso/fin$0http://www.yso.fi/onto/yso/p27206
*650 7$akryptografi$2yso/swe$0http://www.yso.fi/onto/yso/p5480
*650 7$adatasäkerhet$2yso/swe$0http://www.yso.fi/onto/yso/p5479
*650 7$atelekommunikationsnät$2yso/swe$0http://www.yso.fi/onto/yso/p1957
*650 7$adatasekretess$2yso/swe$0http://www.yso.fi/onto/yso/p3636
*650 7$adatanät$2yso/swe$0http://www.yso.fi/onto/yso/p12936
*650 7$askydd (åtgärder)$2yso/swe$0http://www.yso.fi/onto/yso/p3601
*650 7$akryptering$2yso/swe$0http://www.yso.fi/onto/yso/p5475
*650 7$aalgoritmer$2yso/swe$0http://www.yso.fi/onto/yso/p14524
*650 7$atrådlösa nät$2yso/swe$0http://www.yso.fi/onto/yso/p24221
*650 7$ae-post$2yso/swe$0http://www.yso.fi/onto/yso/p16666
*650 7$amolntjänster$2yso/swe$0http://www.yso.fi/onto/yso/p24167
*650 7$asakernas internet$2yso/swe$0http://www.yso.fi/onto/yso/p27206
^
Tästä teoksesta ei ole arvioita.
Näpäytä
kun haluat kirjoittaa ensimmäisen arvion.
For courses in Cryptography, Computer Security, and Network Security. Keep pace with the fast-moving field of cryptography and network security Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.