Cryptography and Network Security, 2/e (SIE) (Record no. 51649)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01599 m a2200217 44500 |
001 - CONTROL NUMBER | |
control field | sulb-eb0027982 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | BD-SySUS |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20160428134609.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | s2010 xx |||||||||||| ||||und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780070702080 |
International Standard Book Number | |
037 ## - SOURCE OF ACQUISITION | |
Terms of availability | $1.00 |
040 1# - CATALOGING SOURCE | |
Original cataloging agency | XX-XxUND |
Transcribing agency | XX-XxUND |
Modifying agency | BD-SySUS. |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Relator code | A01 |
Personal name | FOROUZAN, B. A., |
245 1# - TITLE STATEMENT | |
Title | Cryptography and Network Security, 2/e (SIE) |
Medium | [electronic resource] / |
250 ## - EDITION STATEMENT | |
Edition statement | 2 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 765 p. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Overview: The new edition treats the subject in a lucid manner explaining tough concepts through simple schematic diagrams and easy to understand language. A new chapter on System Security has been included to help understand the attacks by various intruders & malicious softwares on the computer systems and the protective & security measures adopted against them using Firewalls, Intrusion detection systems. Numerous solved examples, algorithms, illustrations & usage of fictitious characters makes the text interesting and simple to read & comprehend. Features: Inclusion of a new chapter on Systems Security Addition of important topics such as types of conventional algorithms, Secure Electronic Transaction (SET), etc. Thorough treatment for topics related to Symmetric Ciphers, AES; Digital Signatures, Hash Functions. Pseudocodes used to illustrate the algorithm implementation. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://mcgrawhilleducation.pdn.ipublishcentral.com/product/cryptography-network-security-2e-sie">http://mcgrawhilleducation.pdn.ipublishcentral.com/product/cryptography-network-security-2e-sie</a> |
Public note | Link to access the E-book |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type |
No items available.