Cryptography and Network Security (Record no. 25813)

MARC details
000 -LEADER
fixed length control field 02545nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180917102813.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180914b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788120350458
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number GUP
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Gupta, Prakash C.
245 ## - TITLE STATEMENT
Title Cryptography and Network Security
Statement of responsibility, etc Prakash C. Gupta
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc PHI Learning,
Date of publication, distribution, etc 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 456 p.:
Other physical details ill.;
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Title Introduction to Network Security<br/><br/>
-- Mathematical Foundations I (Modular Arithmetic)<br/><br/><br/><br/>
-- Classical Encryption Techniques<br/><br/><br/><br/>
-- Symmetric-key Ciphers I: Data Encryption Standard<br/><br/><br/><br/><br/>
-- Mathematical Foundations II (Finite Fields)<br/><br/><br/><br/><br/><br/>
-- Symmetric-key Ciphers II: Advanced Encryption Standard<br/><br/><br/><br/><br/><br/><br/>
-- Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)<br/><br/><br/><br/><br/><br/><br/>
-- Mathematical Foundations III (Prime Numbers)<br/><br/><br/><br/><br/><br/><br/>
-- Asymmetric-key Cryptosystems<br/><br/><br/><br/><br/><br/>
-- Elliptic Curve Cryptography<br/><br/><br/><br/><br/><br/><br/><br/>
-- Message Authentication <br/><br/><br/><br/><br/><br/><br/><br/>
-- Digital Signatures<br/><br/><br/><br/><br/><br/><br/><br/>
-- Entity Authentication<br/><br/><br/><br/><br/><br/><br/><br/>
-- Symmetric-key Distribution<br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Public-key Distribution<br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Email Security<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Transport Layer Security (TLS)<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- IP Security<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Internet Key Exchange (IKE)<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Wireless LAN Security<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Network Vulnerabilities<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Firewalls and Intrusion Detection Systems<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
-- Malware <br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks--Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
520 ## - SUMMARY, ETC.
Summary, etc The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security. <br/> <br/>Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Date checked out
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 14/09/2018   005.82 GUP 34064 14/09/2018 14/09/2018 General Books  
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 14/09/2018 1 005.82 GUP 34065 17/10/2019 14/09/2018 General Books 16/10/2019
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 14/09/2018   005.82 GUP 34066 14/09/2018 14/09/2018 General Books  
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 14/09/2018   005.82 GUP 34067 14/09/2018 14/09/2018 General Books  
    Dewey Decimal Classification   Not For Loan Reference CUTN Central Library CUTN Central Library Generalia 14/09/2018   005.82 GUP 34068 14/09/2018 14/09/2018 Reference Books  

Powered by Koha