MARC details
000 -LEADER |
fixed length control field |
02562nam a22002537a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180912151145.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180912b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9788120350823 |
041 ## - LANGUAGE CODE |
Language |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
PAC |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Pachghare, V. K. |
245 ## - TITLE STATEMENT |
Title |
Cryptography and Information Security |
Statement of responsibility, etc |
V. K. Pachghare |
250 ## - EDITION STATEMENT |
Edition statement |
2ne ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New Delhi : |
Name of publisher, distributor, etc |
PHI Learning, |
Date of publication, distribution, etc |
2017. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 393 p.: |
Other physical details |
ill.; |
Dimensions |
24 cm, |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Data Encryption Techniques<br/> |
-- |
Data Encryption Standards<br/><br/> |
-- |
Advanced Encryption Standard<br/><br/> |
-- |
Symmetric Ciphers<br/><br/> |
-- |
Number Theory<br/><br/><br/> |
-- |
Public Key Cryptosystems<br/><br/><br/><br/> |
-- |
Key Management<br/><br/><br/><br/> |
-- |
Authentication<br/><br/><br/><br/> |
-- |
Digital Signatures<br/><br/><br/><br/> |
-- |
Electronic Mail Security<br/><br/><br/><br/><br/> |
-- |
IP Security<br/><br/><br/><br/> |
-- |
Web Security<br/><br/><br/><br/><br/> |
-- |
Intrusion<br/><br/><br/><br/><br/><br/> |
-- |
Malicious Software<br/><br/><br/><br/><br/><br/><br/> |
-- |
Firewall<br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Computer Forensics <br/><br/><br/><br/><br/><br/><br/><br/> |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
520 ## - SUMMARY, ETC. |
Summary, etc |
This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat’s theorem and Euler’s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also discussed.<br/><br/>This edition includes the topics with new innovations and improvements in the field of cryptography and information security in a substantial and comprehensive way. In this edition, the effort is taken to improve the pedagogy and user friendliness. It incorporates many solved numerical problems to clarify the various concepts and different algorithms and also includes MCQs with their answers in each chapter.<br/><br/>The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech./M.Tech.), undergraduate and postgraduate students of computer science (B.Sc./M.Sc. Computer Science), and information technology (B.Sc./M.Sc. IT) and the students of Master of Computer Applications (MCA). |