Cryptography and security (Record no. 180313)

000 -LEADER
fixed length control field 01914 a2200205 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140323b2011 xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788126522859
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Item number H2C7
Classification number 005.82
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Harini, N.
9 (RLIN) 258666
245 ## - TITLE STATEMENT
Title Cryptography and security
Statement of responsibility, etc. Shyamala, C. K.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc. 2011
Name of publisher, distributor, etc. Wiley India Private Limited
Place of publication, distribution, etc. New Delhi
300 ## - PHYSICAL DESCRIPTION
Extent ix, 529 p.
365 ## - TRADE PRICE
Price type code INR
Price amount 499.00
520 ## - SUMMARY, ETC.
Summary, etc. In this book, basic concepts of cryptography and security are introduced. Cryptography and security are dealt with in sufficient depth and detail without losing focus. Symmetric and asymmetric key cryptography Elliptic curve cryptography, hashing functions, message authentication, and digital signature are discussed and salient features in each explained. Subsequently the cryptographic concepts are used to address security issues at application, transport, and network layers. Security threats at various levels and counter measures are explained. Relevant standards and applications are given sufficient attention. The book is organized into three parts. Part A is devoted to cryptography. Necessary mathematical background is provided; currently used cryptosystems as well as authentication and signature schemes are dealt with in adequate depth and detail. Network security is dealt with in Part B. Authentication schemes, internet security protocols, and related services in current use are explained in all their aspects. System security is the scope of Part C. Intrusion, viruses, worms etc., are dealt with in terms of their structures, threats, and protection from them inclusive of firewalls. Adequate justice is done to digital immune systems and trusted systems. Necessary supplementary material is provided as appendices.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
9 (RLIN) 61372
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
9 (RLIN) 56817
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Shyamala, C. K.
9 (RLIN) 254404
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Padmanabhan, T. R.
9 (RLIN) 254405
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Item location Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        Non-fiction Vikram Sarabhai Library Vikram Sarabhai Library   06/12/2013 7 399.20 Slot 98 (0 Floor, West Wing) 005.82 H2C7 180397 06/12/2013 499.00 05/12/2013 Books

Powered by Koha