MARC details
000 -LEADER |
fixed length control field |
02545nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180917102813.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180914b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9788120350458 |
041 ## - LANGUAGE CODE |
Language |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
GUP |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Gupta, Prakash C. |
245 ## - TITLE STATEMENT |
Title |
Cryptography and Network Security |
Statement of responsibility, etc |
Prakash C. Gupta |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New Delhi : |
Name of publisher, distributor, etc |
PHI Learning, |
Date of publication, distribution, etc |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xx, 456 p.: |
Other physical details |
ill.; |
Dimensions |
24 cm. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Introduction to Network Security<br/><br/> |
-- |
Mathematical Foundations I (Modular Arithmetic)<br/><br/><br/><br/> |
-- |
Classical Encryption Techniques<br/><br/><br/><br/> |
-- |
Symmetric-key Ciphers I: Data Encryption Standard<br/><br/><br/><br/><br/> |
-- |
Mathematical Foundations II (Finite Fields)<br/><br/><br/><br/><br/><br/> |
-- |
Symmetric-key Ciphers II: Advanced Encryption Standard<br/><br/><br/><br/><br/><br/><br/> |
-- |
Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)<br/><br/><br/><br/><br/><br/><br/> |
-- |
Mathematical Foundations III (Prime Numbers)<br/><br/><br/><br/><br/><br/><br/> |
-- |
Asymmetric-key Cryptosystems<br/><br/><br/><br/><br/><br/> |
-- |
Elliptic Curve Cryptography<br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Message Authentication <br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Digital Signatures<br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Entity Authentication<br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Symmetric-key Distribution<br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Public-key Distribution<br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Email Security<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Transport Layer Security (TLS)<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
IP Security<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Internet Key Exchange (IKE)<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Wireless LAN Security<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Network Vulnerabilities<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Firewalls and Intrusion Detection Systems<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
-- |
Malware <br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/> |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
General Books |
520 ## - SUMMARY, ETC. |
Summary, etc |
The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security. <br/> <br/>Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book. |