Network security : (Record no. 189602)

MARC details
000 -LEADER
fixed length control field 02831nam a22003257a 4500
001 - CONTROL NUMBER
control field 22657086
003 - CONTROL NUMBER IDENTIFIER
control field IIITD
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240817114130.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220616s2022 nju 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2022941173
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788196874339
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number KAU-N
245 10 - TITLE STATEMENT
Title Network security :
Remainder of title private communications in a public world
Statement of responsibility, etc by Charlie Kaufman ... [et al.]
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Noida :
Name of publisher, distributor, etc Pearson,
Date of publication, distribution, etc ©2024
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2209
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 429 p. :
Other physical details ill. ;
Dimensions 24 cm.
505 ## - FORMATTED CONTENTS NOTE
Title 1. Introduction
-- 2. Introduction to Cryptography
-- 3. Secret Key Cryptography
-- 4. Modes of Operation
-- 5. Cryptographic Hashes
-- 6. First-Generation Public Key Algorithms
-- 7. Quantum Computing
-- 8. Post-Quantum Cryptography
-- 9. Authentication of People
-- 10. Trusted Intermediaries
-- 11. Communication Session Establishment
-- 13. SSL/TLS and SSH
-- 14. Electronic Mail Security
-- 15. Electronic Money
-- 16. Cryptographic Tricks
-- 17. Folklore
520 ## - SUMMARY, ETC.
Summary, etc "With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies"--
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Network Security
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kaufman, Charlie
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Perlman, Radia
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Speciner, Mike
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Perlner, Ray
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 0
b ibc
c orignew
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Bill No. Bill Date Cost, normal purchase price PO No. PO Date Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Vendor/Supplier Koha item type
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD General Stacks 17/08/2024 2024-25/952 2024-08-10 647.5 IIITD/LIC/BS/2021/02/76 2024-08-06   005.8 KAU-N 013044 17/08/2024 925 17/08/2024 Indica Publishers & Distributors Pvt. Ltd. Books
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD General Stacks 17/08/2024 2024-25/952 2024-08-10 647.5 IIITD/LIC/BS/2021/02/76 2024-08-06   005.8 KAU-N 013045 17/08/2024 925 17/08/2024 Indica Publishers & Distributors Pvt. Ltd. Books
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD General Stacks 17/08/2024 2024-25/952 2024-08-10 647.5 IIITD/LIC/BS/2021/02/76 2024-08-06   005.8 KAU-N 013047 17/08/2024 925 17/08/2024 Indica Publishers & Distributors Pvt. Ltd. Books
    Dewey Decimal Classification     Computer Science and Engineering IIITD IIITD General Stacks 17/08/2024 2024-25/952 2024-08-10 647.5 IIITD/LIC/BS/2021/02/76 2024-08-06   005.8 KAU-N 013043 17/08/2024 925 17/08/2024 Indica Publishers & Distributors Pvt. Ltd. Books
    Dewey Decimal Classification   Not for loan Computer Science and Engineering IIITD IIITD Reference 17/08/2024 2024-25/952 2024-08-10 647.5 IIITD/LIC/BS/2021/02/76 2024-08-06   REF 005.8 KAU-N 013046 17/08/2024 925 17/08/2024 Indica Publishers & Distributors Pvt. Ltd. Books
© 2024 IIIT-Delhi, library@iiitd.ac.in