Information security : (Record no. 172574)

MARC details
000 -LEADER
fixed length control field 02140nam a22002657a 4500
003 - CONTROL NUMBER IDENTIFIER
control field IIITD
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240510132539.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240416b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789354644313
040 ## - CATALOGING SOURCE
Original cataloging agency IIITD
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number STA-I
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark
245 ## - TITLE STATEMENT
Title Information security :
Remainder of title principles and practice, an Indian adaptation
Statement of responsibility, etc by Mark Stamp
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New delhi :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc ©2023
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 530 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Title 1 Introductions
-- 2 Classic Cryptography
-- 3 Symmetric Ciphers
-- 4 Public Key Crypto
-- 5 Crypto Hash Functions++
-- 6 Authentication
-- 7 Authorization
-- 8 Network Security Basics
-- 9 Simple Authentication Protocols
-- 10 Real-World Security Protocols
-- 11 Software Flaws and Malware
-- 12 Insecurity in Software
520 ## - SUMMARY, ETC.
Summary, etc "As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--BOOK JACKET.<br/>Collapse summary
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element General & Introductory Computer Science Products.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Technologies Products.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Bill No. Bill Date Cost, normal purchase price PO No. PO Date Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Vendor/Supplier Koha item type
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD General Stacks 16/04/2024 TB117 2024-03-30 594.3 IIITD/LIC/BS/2021/03/71 2024-03-28   005.8 STA-I 012911 10/07/2024 849 16/04/2024 Technical Bureau India Pvt. Ltd. Books
© 2024 IIIT-Delhi, library@iiitd.ac.in