CRYPTOGRAPHY AND NETWORK SECURITY (Record no. 31398)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01500 a2200181 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130912b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 978-1-25-902988-2 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | KAHATE, ATUL |
9 (RLIN) | 10830 |
245 ## - TITLE STATEMENT | |
Title | CRYPTOGRAPHY AND NETWORK SECURITY |
Statement of responsibility, etc | KAHATE, ATUL |
250 ## - EDITION STATEMENT | |
Edition statement | 3 |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | MCGRAW HILL EDUCATION (INDIA) PRIVATE LIMITED |
Date of publication, distribution, etc | 2003 |
Place of publication, distribution, etc | NEW DELHI |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XXII, 501 |
Other physical details | PAPER |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Introduction to the Concepts of Security<br/>2. Cryptography Techniques<br/>3. Computer-based Symmetric Key Cryptographic Algorithms<br/>4. Computer-based Asymmetric-Key Cryptography Algorithms<br/>5. Public Key Infrastructure (PKI)<br/>6. Internet-Security Protocols<br/>7. User-Authentication Mechanisms<br/>8. Practical Implementations of Cryptography/Security<br/>9. Network Security, Firewalls, and Virtual Private Networks (VPN)<br/>Appendices<br/>A. Mathematical Background<br/>B. Number Systems<br/>C. Information Theory<br/>D. Real-life Tools<br/>E. Web Resources<br/>F. A Brief Introduction to ASN, BER, DER |
520 ## - SUMMARY, ETC. | |
Summary, etc | In its signature style, the third edition clearly presents all key concepts of the subject like Data Encryption Standard, Ciphers, IP Security and Web Security, via easy-to-follow examples and diagrams, keeping complex mathematical treatments at bay. With ample practical examples, case studies and large number of pedagogy, the book perfectly motivates readers to delve into the application aspects of the subject. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | CRYPTOGRAPHY AND NETWORK SECURITY |
9 (RLIN) | 10831 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Main Library | Main Library | 05/10/2013 | 12 | 360.00 | 005.8/KAH/21830 | 11121830 | 07/06/2022 | 450.00 | 05/10/2013 |