Welcome to Central Library, SUST

CRYPTOGRAPHY AND NETWORK SECURITY (Record no. 52048)

MARC details
000 -LEADER
fixed length control field 02416 m a2200205 44500
001 - CONTROL NUMBER
control field sulb-eb0028381
003 - CONTROL NUMBER IDENTIFIER
control field BD-SySUS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20160428134620.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field s2007 xx |||||||||||| ||||und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071336802
International Standard Book Number
037 ## - SOURCE OF ACQUISITION
Terms of availability 4788
040 1# - CATALOGING SOURCE
Original cataloging agency XX-XxUND
Transcribing agency XX-XxUND
Modifying agency BD-SySUS.
100 1# - MAIN ENTRY--PERSONAL NAME
Relator code A01
Personal name KAHATE,
245 1# - TITLE STATEMENT
Title CRYPTOGRAPHY AND NETWORK SECURITY
Medium [electronic resource] /
300 ## - PHYSICAL DESCRIPTION
Extent 792 p.
520 ## - SUMMARY, ETC.
Summary, etc. Security being one of the main concerns of any organization, this title clearly explains the concepts behind Cryptography and the principles employed behind Network Security. The text steers clear of complex mathematical treatment and presents the concepts involved through easy-to-follow examples and schematic diagrams. This text can very well serve as a main text for students pursuing CSE or IT streams. Key features Uses a bottom-up approach, where introductory topics are followed by topics on Cryptography, Network Security and then Case Studies. Updated coverage of Symmetric Key & Asymetric Key Cryptographic Algorithms, including expanded section on AES, Blowfish, & Digital Certificates. Stress on Case Studies and Practical Implementations of Cryptography. Pedagogical Features: 140 Multiple Choice Questions 135 Exercises 125 Design/Programming Exercises 600 figures New to the Edition: Content on AES, PGP, S/MIME and Blowfish has been expanded. New topics like Birthday Attacks, Trusted Systems, OSI Architecture, Buffer Overflow, and Legal/Ethical Issues added. Chapter on Practical Implementations of Cryptography has been updated by adding .NET Cryptography, TCP/IP Vulnerabilities, and security in OS. Chapter on Network Security has been updated by adding material on NAT (Network Added Translation), Audit Records, and Honeypots. 138 new exercises have been added to the already existing pool of exercises. Chapter on Public Key Infrastructure has been expanded by adding sections on Java and Digital Certificates. Every chapter has undergone extensive revision, whereby a perfect balance has been maintained between mathematics and theory. Rich pedagogy in terms of Exercises and Design/Programming Problems. Good supporting material available on the web site.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://mcgrawhilleducation.pdn.ipublishcentral.com/product/cryptography-network-security7131">http://mcgrawhilleducation.pdn.ipublishcentral.com/product/cryptography-network-security7131</a>
Public note Link to access the E-book
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type

No items available.