cryptography and information security/ (Record no. 2657)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01416nam a22002177a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20140116124900.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 140116b2009 ii ||||g |||| 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788120335219 (pbk) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NCL |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 |
Item number | PAC- 2009 4069 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Pachghare, V K |
245 1# - TITLE STATEMENT | |
Title | cryptography and information security/ |
Statement of responsibility, etc. | by V K pachghare |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New Delhi : |
Name of publisher, distributor, etc. | PHI, |
Date of publication, distribution, etc. | 2009c. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 367p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | Index present |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. INTRODUCTION ---<br/>2. DATA ENCRYPTION TECHNIQUES ---<br/>3. DATA ENCRYPTION STANDARDS ---<br/>4. ADVANCED ENCRYPTION STANDARDS ---<br/>5. SYMMETRIC CIPHERS ---<br/>6. NUMBER THEORY ---<br/>7. PUBLIC KEY CRYPTOSYSTEMS ---<br/>8. KEY MANAGEMENT ---<br/>9. AUTHENTICATION ---<br/>10. DIGITAL SIGNATURES ---<br/>11. ELECTRONIC MAIL SECURITY ---<br/>12. IP SECURITY ---<br/>13. WEB SECURITY ---<br/>14. INTRUSION ---<br/>15. MALICIOUS SOFTWARE ---<br/>16. FIREWALL ---<br/>17. COMPUTER FORENSICS. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat s theorem and Euler s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Namal Library | Namal Library | Computer Science | 01/16/2014 | allied book company | 441.38 | Bill No. 2984 | 3 | 2 | 005.82 PAC- 2009 4069 | 0004069 | 05/10/2023 | 09/29/2022 | 01/16/2014 | Books |