cryptography and information security/ (Record no. 2657)

MARC details
000 -LEADER
fixed length control field 01416nam a22002177a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140116124900.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140116b2009 ii ||||g |||| 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788120335219 (pbk)
040 ## - CATALOGING SOURCE
Transcribing agency NCL
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number PAC- 2009 4069
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Pachghare, V K
245 1# - TITLE STATEMENT
Title cryptography and information security/
Statement of responsibility, etc. by V K pachghare
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. New Delhi :
Name of publisher, distributor, etc. PHI,
Date of publication, distribution, etc. 2009c.
300 ## - PHYSICAL DESCRIPTION
Extent 367p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Index present
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. INTRODUCTION ---<br/>2. DATA ENCRYPTION TECHNIQUES ---<br/>3. DATA ENCRYPTION STANDARDS ---<br/>4. ADVANCED ENCRYPTION STANDARDS ---<br/>5. SYMMETRIC CIPHERS ---<br/>6. NUMBER THEORY ---<br/>7. PUBLIC KEY CRYPTOSYSTEMS ---<br/>8. KEY MANAGEMENT ---<br/>9. AUTHENTICATION ---<br/>10. DIGITAL SIGNATURES ---<br/>11. ELECTRONIC MAIL SECURITY ---<br/>12. IP SECURITY ---<br/>13. WEB SECURITY ---<br/>14. INTRUSION ---<br/>15. MALICIOUS SOFTWARE ---<br/>16. FIREWALL ---<br/>17. COMPUTER FORENSICS.
520 ## - SUMMARY, ETC.
Summary, etc. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat s theorem and Euler s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Price effective from Koha item type
          Namal Library Namal Library Computer Science 01/16/2014 allied book company 441.38 Bill No. 2984 3 2 005.82 PAC- 2009 4069 0004069 05/10/2023 09/29/2022 01/16/2014 Books