Cryptography and network security : principles and practice / / William Stallings |
Autore | Stallings William |
Edizione | [Seventh, global edition.] |
Pubbl/distr/stampa | Boston : , : Pearson, , [2017] |
Descrizione fisica | 1 online resource (766 pages) : illustrations ; |
Disciplina | 005.82 |
Collana | Always learning |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN |
9781292158594
9781292158587 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures |
Record Nr. | UNINA-9910154943503321 |
Stallings William
![]() |
||
Boston : , : Pearson, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography and network security : principles and practice / William Stallings ; International edition contributions by Mohit P. Tahilianim Nitk Surathkal |
Autore | Stallings, William |
Edizione | [6th ed.] |
Pubbl/distr/stampa | Boston : Pearson, ©2014 |
Descrizione fisica | 751 p. : ill. ; 22 cm |
Disciplina | 005.8 |
Soggetto non controllato |
Reti di computer - Sicurezza dei dati
Crittografia |
ISBN | 978-0-273-79335-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990010102750403321 |
Stallings, William
![]() |
||
Boston : Pearson, ©2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography and network security : principles and practice / / William Stallings ; contributions by Mohit P. Tahiliani |
Autore | Stallings William |
Edizione | [Sixth edition.] |
Pubbl/distr/stampa | Boston, [Massachusetts] : , : Pearson, , 2014 |
Descrizione fisica | 1 online resource (755 pages) : illustrations |
Disciplina | 005.8 |
Collana | Always Learning |
Soggetto topico |
Computer networks - Security measures
Data encryption (Computer science) Coding theory |
ISBN |
9781488682957
9780273793359 1-4886-8295-X 0-273-79376-4 |
Formato | Multimedia ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Contents -- Notation -- Preface -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of This Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Chapter 1 Overview -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 A Model for Network Security -- 1.7 Recommended Reading -- 1.8 Key Terms, Review Questions, and Problems -- PART ONE: SYMMETRIC CIPHERS -- Chapter 2 Classical Encryption Techniques -- 2.1 Symmetric Cipher Model -- 2.2 Substitution Techniques -- 2.3 Transposition Techniques -- 2.4 Rotor Machines -- 2.5 Steganography -- 2.6 Recommended Reading -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Block Ciphers and the Data Encryption Standard -- 3.1 Traditional Block Cipher Structure -- 3.2 The Data Encryption Standard -- 3.3 A DES Example -- 3.4 The Strength of DES -- 3.5 Block Cipher Design Principles -- 3.6 Recommended Reading -- 3.7 Key Terms, Review Questions, and Problems -- Chapter 4 Basic Concepts in Number Theory and Finite Fields -- 4.1 Divisibility and the Division Algorithm -- 4.2 The Euclidean Algorithm -- 4.3 Modular Arithmetic -- 4.4 Groups, Rings, and Fields -- 4.5 Finite Fields of the Form GF(p) -- 4.6 Polynomial Arithmetic -- 4.7 Finite Fields of the Form GF(2(Sup[n])) -- 4.8 Recommended Reading -- 4.9 Key Terms, Review Questions, and Problems -- Appendix 4A The Meaning of mod -- Chapter 5 Advanced Encryption Standard -- 5.1 Finite Field Arithmetic -- 5.2 AES Structure -- 5.3 AES Transformation Functions -- 5.4 AES Key Expansion -- 5.5 An AES Example -- 5.6 AES Implementation -- 5.7 Recommended Reading -- 5.8 Key Terms, Review Questions, and Problems -- Appendix 5A Polynomials with Coefficients in GF(2(Sup[8])) -- Appendix 5B Simplified AES.
Chapter 6 Block Cipher Operation -- 6.1 Multiple Encryption and Triple DES -- 6.2 Electronic Code book -- 6.3 Cipher Block Chaining Mode -- 6.4 Cipher Feedback Mode -- 6.5 Output Feedback Mode -- 6.6 Counter Mode -- 6.7 XTS-AES Mode for Block-Oriented Storage Devices -- 6.8 Recommended Reading -- 6.9 Key Terms, Review Questions, and Problems -- Chapter 7 Pseudorandom Number Generation and Stream Ciphers -- 7.1 Principles of Pseudorandom Number Generation -- 7.2 Pseudorandom Number Generators -- 7.3 Pseudorandom Number Generation Using a Block Cipher -- 7.4 Stream Ciphers -- 7.5 RC4 -- 7.6 True Random Number Generators -- 7.7 Recommended Reading -- 7.8 Key Terms, Review Questions, and Problems -- PART TWO: ASYMMETRIC CIPHERS -- Chapter 8 More Number Theory -- 8.1 Prime Numbers -- 8.2 Fermat's and Euler's Theorems -- 8.3 Testing for Primality -- 8.4 The Chinese Remainder Theorem -- 8.5 Discrete Logarithms -- 8.6 Recommended Reading -- 8.7 Key Terms, Review Questions, and Problems -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Recommended Reading -- 9.4 Key Terms, Review Questions, and Problems -- Appendix 9A The Complexity of Algorithms -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Recommended Reading -- 10.7 Key Terms, Review Questions, and Problems -- PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA). 11.6 SHA-3 -- 11.7 Recommended Reading -- 11.8 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation using Hash Functions and MACs -- 12.10 Recommended Reading -- 12.11 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- PART FOUR: MUTUAL TRUST -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Recommended Reading -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Recommended Reading -- 15.8 Key Terms, Review Questions, and Problems -- PART FIVE: NETWORK AND INTERNET SECURITY -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control. 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Recommended Reading -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Secure Sockets Layer -- 17.3 Transport Layer Security -- 17.4 HTTPS -- 17.5 Secure Shell (SSH) -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Recommended Reading -- 18.6 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Pretty Good Privacy -- 19.2 S/MIME -- 19.3 DomainKeys Identified Mail -- 19.4 Recommended Reading -- 19.5 Key Terms, Review Questions, and Problems -- Appendix 19A Radix-64 Conversion -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Recommended Reading -- 20.8 Key Terms, Review Questions, and Problems -- APPENDICES -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality. B.2 Chapter 2: Classical Encryption -- B.3 Chapter 3: Block Ciphers and the Data Encryption Standard -- B.4 Chapter 4: Basic Concepts in Number Theory and Finite Fields -- B.5 Chapter 5: Advanced Encryption Standard -- B.6 Chapter 6: Pseudorandom Number Generation and Stream Ciphers -- B.7 Chapter 8: Number Theory -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures -- References -- Credits -- Index. |
Record Nr. | UNINA-9910151655203321 |
Stallings William
![]() |
||
Boston, [Massachusetts] : , : Pearson, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography and network security : principales and practice / Wiliam Stallings |
Autore | STALLINGS, William |
Edizione | [4th ed.] |
Pubbl/distr/stampa | Upper Saddle River, NJ : Pearson Prentice Hall, copyr.2006 |
Descrizione fisica | XVI, 680 p. : ill. ; 24 cm |
Disciplina | 005.8 |
Soggetto topico |
Crittografia
Reti di elaborazione - Affibilità Teoria della codificazione |
ISBN | 0-13-187316-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990002934400203316 |
STALLINGS, William
![]() |
||
Upper Saddle River, NJ : Pearson Prentice Hall, copyr.2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptography and network security : principles and practice / William Stallings |
Autore | Stallings, William |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Upper Saddle River [N.J.] : Prentice Hall, c1999 |
Descrizione fisica | xvii, 569 p. : ill. ; 24 cm |
Disciplina | 005.8 |
Soggetto non controllato |
Reti di computer
Misure di sicurezza Sicurezza dei dati Controllo dell'accesso Crittografia |
ISBN | 0-13-869017-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-990001496790403321 |
Stallings, William
![]() |
||
Upper Saddle River [N.J.] : Prentice Hall, c1999 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptography and network security : principales and practice / Wiliam Stallings |
Autore | STALLINGS, William |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | New Jersey : Prentice Hall, 1999 |
Descrizione fisica | XVII, 569 p. : ill. ; 30 cm |
Disciplina | 005.8 |
Soggetto topico |
Crittografia
Reti di elaborazione - Affibilità Teoria della codificazione |
ISBN | 0-13-869017-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000314610203316 |
STALLINGS, William
![]() |
||
New Jersey : Prentice Hall, 1999 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptography and network security : principles and practice / William Stallings |
Autore | Stallings, William |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Upper Saddle River, N.J. : Prentice Hall, c2003 |
Descrizione fisica | xiv, 681 p. : ill. ; 24 cm |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Data encryption (Computer science) Computer security |
ISBN | 0131115022 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991001040939707536 |
Stallings, William
![]() |
||
Upper Saddle River, N.J. : Prentice Hall, c2003 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Data & computer communications / William Stallings |
Autore | STALLINGS, William |
Edizione | [6th ed.] |
Pubbl/distr/stampa | New Jersey : Prentice-Hall, c2000 |
Descrizione fisica | XX, 810 p. : ill. ; 30 cm |
Disciplina | 004.6 |
Soggetto non controllato |
Reti di elaboratori
Sistemi di trasmissione dati |
ISBN | 0-13-086388-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000332580203316 |
STALLINGS, William
![]() |
||
New Jersey : Prentice-Hall, c2000 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data and computer communications / / William Stallings ; international edition contributions by Moumita Mitra Manna (Bangabasi College, Kolkata) |
Autore | Stallings William |
Edizione | [Tenth edition.] |
Pubbl/distr/stampa | Boston : , : Pearson, , [2014] |
Descrizione fisica | 1 online resource (914 pages) : color illustrations, tables |
Disciplina | 004.6 |
Altri autori (Persone) | MannaMoumita Mitra |
Collana | Always learning |
Soggetto topico |
Dades - Transmissió
Data transmission systems |
ISBN | 1-292-01439-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover -- Title Page -- Contents -- Preface -- Acknowledgments -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of the Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Unit One Fundamentals -- Part One Overview -- Chapter 1 Data Communications, Data Networks, and the Internet -- 1.1 Data Communications and Networking for Today's Enterprise -- 1.2 A Communications Model -- 1.3 Data Communications -- 1.4 Networks -- 1.5 The Internet -- 1.6 An Example Configuration -- Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications -- 2.1 The Need for a Protocol Architecture -- 2.2 A Simple Protocol Architecture -- 2.3 The TCP/IP Protocol Architecture -- 2.4 Standardization within a Protocol Architecture -- 2.5 Traditional Internet-Based Applications -- 2.6 Multimedia -- 2.7 Sockets Programming -- 2.8 Recommended Reading and Animation -- 2.9 Key Terms, Review Questions, and Problems -- 2.10 Sockets Programming Assignments -- Appendix 2A The Trivial File Transfer Protocol -- Part Two Data Communications -- Chapter 3 Data Transmission -- 3.1 Concepts and Terminology -- 3.2 Analog and Digital Data Transmission -- 3.3 Transmission Impairments -- 3.4 Channel Capacity -- 3.5 Recommended Reading -- 3.6 Key Terms, Review Questions, and Problems -- Appendix 3A Decibels and Signal Strength -- Chapter 4 Transmission Media -- 4.1 Guided Transmission Media -- 4.2 Wireless Transmission -- 4.3 Wireless Propagation -- 4.4 Line-of-Sight Transmission -- 4.5 Recommended Reading -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Signal Encoding Techniques -- 5.1 Digital Data, Digital Signals -- 5.2 Digital Data, Analog Signals -- 5.3 Analog Data, Digital Signals -- 5.4 Recommended Reading and Animations -- 5.5 Key Terms, Review Questions, and Problems -- Chapter 6 Error Detection and Correction -- 6.1 Types of Errors -- 6.2 Error Detection -- 6.3 Parity Check -- 6.4 The Internet Checksum -- 6.5 Cyclic Redundancy Check (CRC) -- 6.6 Forward Error Correction -- 6.7 Recommended Reading and Animations -- 6.8 Key Terms, Review Questions, and Problems -- Chapter 7 Data Link Control Protocols -- 7.1 Flow Control -- 7.2 Error Control -- 7.3 High-Level Data Link Control (HDLC) -- 7.4 Recommended Reading and Animations -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 Multiplexing -- 8.1 Frequency-Division Multiplexing -- 8.2 Synchronous Time-Division Multiplexing -- 8.3 Cable Modem -- 8.4 Asymmetric Digital Subscriber Line -- 8.5 xDSL -- 8.6 Multiple Channel Access -- 8.7 Recommended Reading and Animations -- 8.8 Key Terms, Review Questions, and Problems -- Part Three Wide Area Networks -- Chapter 9 WAN Technology and Protocols -- 9.1 Switched Communications Networks -- 9.2 Circuit-Switching Networks -- 9.3 Circuit-Switching Concepts -- 9.4 Softswitch Architecture -- 9.5 Packet-Switching Principles -- 9.6 Asynchronous Transfer Mode -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- Chapter 10 Cellular Wireless Networks -- 10.1 Principles of Cellular Networks -- 10.2 Cellular Network Generations -- 10.3 LTE-Advanced -- 10.4 Recommended Reading -- 10.5 Key Terms, Review Questions, and Problems -- Part Four Local Area Networks -- Chapter 11 Local Area Network Overview -- 11.1 Bus and Star Topologies -- 11.2 LAN Protocol Architecture -- 11.3 Bridges -- 11.4 Hubs and Switches -- 11.5 Virtual LANs -- 11.6 Recommended Reading and Animations -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Ethernet -- 12.1 Traditional Ethernet -- 12.2 High-Speed Ethernet -- 12.3 IEEE 802.1Q VLAN Standard -- 12.4 Recommended Reading and Animations -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 24.3 Web Access and HTTP -- 24.4 Recommended Reading and Animations -- 24.5 Key Terms, Review Questions, and Problems -- Chapter 25 Internet Multimedia Support -- 25.1 Real-Time Traffic -- 25.2 Voice Over IP -- 25.3 Session Initiation Protocol -- 25.4 Real-Time Transport Protocol (RTP) -- 25.5 Recommended Reading -- 25.6 Key Terms, Review Questions, and Problems. |
Record Nr. | UNINA-9910153256603321 |
Stallings William
![]() |
||
Boston : , : Pearson, , [2014] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and computer communications / William Stallings. |
Autore | Stallings, William |
Edizione | [7th ed.] |
Pubbl/distr/stampa | Upper Saddle River, N.J. : Pearson/Prentice Hall, c2004 |
Descrizione fisica | xvi, 847 p. : ill. ; 25 cm |
Disciplina | 004.6 |
Soggetto topico |
Data transmission systems
Computer networks |
ISBN | 0131833111 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991001694619707536 |
Stallings, William
![]() |
||
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2004 | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|