MARC details
000 -LEADER |
fixed length control field |
02140nam a22002657a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240510132539.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240416b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789354644313 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
IIITD |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
STA-I |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stamp, Mark |
245 ## - TITLE STATEMENT |
Title |
Information security : |
Remainder of title |
principles and practice, an Indian adaptation |
Statement of responsibility, etc |
by Mark Stamp |
250 ## - EDITION STATEMENT |
Edition statement |
3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New delhi : |
Name of publisher, distributor, etc |
Wiley, |
Date of publication, distribution, etc |
©2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 530 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
1 Introductions |
-- |
2 Classic Cryptography |
-- |
3 Symmetric Ciphers |
-- |
4 Public Key Crypto |
-- |
5 Crypto Hash Functions++ |
-- |
6 Authentication |
-- |
7 Authorization |
-- |
8 Network Security Basics |
-- |
9 Simple Authentication Protocols |
-- |
10 Real-World Security Protocols |
-- |
11 Software Flaws and Malware |
-- |
12 Insecurity in Software |
520 ## - SUMMARY, ETC. |
Summary, etc |
"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--BOOK JACKET.<br/>Collapse summary |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer Security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
General & Introductory Computer Science Products. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information Technologies Products. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |