MARC details
000 -LEADER |
fixed length control field |
01977cam a2200301Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230302133327.0 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789332585225 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
SINTU |
Transcribing agency |
SINTU |
Modifying agency |
IXA |
-- |
BAKER |
Language of cataloging |
Eng |
Description conventions |
rda |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
Eng |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
TK5105.59 |
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
.S713 2006 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stallings, William |
Relator term |
Author. |
245 10 - TITLE STATEMENT |
Title |
Cryptography and network security : |
Remainder of title |
principles and practice / |
Statement of responsibility, etc. |
William Stallings |
250 ## - EDITION STATEMENT |
Edition statement |
Seventh edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
India : |
Name of publisher, distributor, etc. |
Pearson, |
Date of publication, distribution, etc. |
2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
766 pages : |
Other physical details |
illustrations |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
Media type code |
n |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
Carrier type code |
nc |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Cryptography and Network Security1 IntroductionPart 1 Symmetric-Key Encipherment2 Mathematics of Cryptography3 Traditional Symmetric-Key Ciphers4 Mathematics of Cryptography5 Introduction to Modern Symmetric-Key Ciphers6 Data Encryption Standard (DES)7 Advanced Encryption Standard (AES)8 Encipherment Using Modern Symmetric-Key CiphersPart 2 Asymmetric-Key Encipherment9 Mathematics of Cryptography10 Asymmetric-Key CryptographyPart 3 Integrity, Authentication, and Key Management11 Message Integrity and Message Authentication12 Cryptographic Hash Functions13 Digital Signature14 Entity Authentication15 Key ManagementPart 4 Network Security16 Security at the Application Layer: PGP and S/MIME17 Security at the Transport Layer: SSL and TLS18 Security at the Network Layer: IPSec |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Includes difficult concepts of cryptography and network security. This title presents difficult security topics from the ground up. It provides an introduction to the fundamentals of number theory, giving the way for the student to move on to more complex security and cryptography topics |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Coding theory |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |