|
|
|
|
| LEADER |
02825nam a2200589 4500 |
| 001 |
ocn911135225 |
| 003 |
OCoLC |
| 005 |
20170124070344.9 |
| 006 |
m o d |
| 007 |
cr ||||||||||| |
| 008 |
150615s2015 nju ob 001 0 eng |
| 010 |
|
|
|a 2015023847
|
| 040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d N$T
|d EBLCP
|d YDXCP
|d OCLCF
|d CDX
|d IDEBK
|d DG1
|d VRC
|d DEBSZ
|d DEBBG
|d YDX
|d CCO
|d GrThAP
|
| 019 |
|
|
|a 957605744
|
| 020 |
|
|
|a 9781119113102
|q electronic bk.
|
| 020 |
|
|
|a 1119113105
|q electronic bk.
|
| 020 |
|
|
|a 9781118939499 (pdf)
|
| 020 |
|
|
|a 1118939492 (pdf)
|
| 020 |
|
|
|a 9781118939505 (epub)
|
| 020 |
|
|
|a 1118939506 (epub)
|
| 020 |
|
|
|z 9781118939482 (cloth)
|
| 029 |
1 |
|
|a DEBBG
|b BV042989352
|
| 029 |
1 |
|
|a DEBSZ
|b 475044207
|
| 029 |
1 |
|
|a AU@
|b 000058373550
|
| 029 |
1 |
|
|a DEBBG
|b BV043738000
|
| 035 |
|
|
|a (OCoLC)911135225
|z (OCoLC)957605744
|
| 042 |
|
|
|a pcc
|
| 050 |
0 |
0 |
|a TK5105.59
|
| 072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
| 072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
| 082 |
0 |
0 |
|a 005.8
|2 23
|
| 049 |
|
|
|a MAIN
|
| 100 |
1 |
|
|a Wang, Jie,
|d 1961-
|
| 245 |
1 |
0 |
|a Introduction to network security :
|b theory and practice /
|c Jie Wang, Department of Computer Science at the University of Massachusetts Lowell and Zachary A. Kissel, Department of Computer Science at Merrimack College in North Andover, MA.
|
| 250 |
|
|
|a Second edition.
|
| 264 |
|
1 |
|a Hoboken, NJ :
|b Wiley ;
|a Singapore :
|b HEP,
|c 2015.
|
| 300 |
|
|
|a 1 online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b n
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b nc
|2 rdacarrier
|
| 504 |
|
|
|a Includes bibliographical references and index.
|
| 505 |
0 |
|
|a Front Matter -- Network Security Overview -- Data Encryption Algorithms -- Public-Key Cryptography and Key Management -- Data Authentication -- Network Security Protocols in Practice -- Wireless Network Security -- Cloud Security -- Network Perimeter Security -- Intrusion Detections -- The Art of Anti-Malicious Software -- 7-bit ASCII code -- SHA-512 Constants (in Hexadecimal) -- Data Compression Using ZIP -- Base64 Encoding -- Cracking WEP Keys Using WEPCrack -- Acronyms -- Further Readings -- Index
|
| 588 |
|
|
|a Description based on print version record and CIP data provided by publisher.
|
| 650 |
|
0 |
|a Computer networks
|x Security measures.
|
| 650 |
|
7 |
|a COMPUTERS / Networking / Security
|2 bisacsh
|
| 650 |
|
7 |
|a COMPUTERS / Security / General
|2 bisacsh
|
| 650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
| 655 |
|
4 |
|a Electronic books.
|
| 700 |
1 |
|
|a Kissel, Zachary A.
|
| 776 |
0 |
8 |
|i Print version:
|a Wang, Jie, 1961-
|t Introduction to network security
|b Second edition.
|d Hoboken, NJ : Wiley ; Singapore : HEP, 2015
|z 9781118939482
|w (DLC) 2015021074
|
| 856 |
4 |
0 |
|u https://doi.org/10.1002/9781119113102
|z Full Text via HEAL-Link
|
| 994 |
|
|
|a 92
|b DG1
|