CRYPTOGRAPHY AND NETWORK SECURITY (Record no. 52048)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02416 m a2200205 44500 |
001 - CONTROL NUMBER | |
control field | sulb-eb0028381 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | BD-SySUS |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20160428134620.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | s2007 xx |||||||||||| ||||und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071336802 |
International Standard Book Number | |
037 ## - SOURCE OF ACQUISITION | |
Terms of availability | 4788 |
040 1# - CATALOGING SOURCE | |
Original cataloging agency | XX-XxUND |
Transcribing agency | XX-XxUND |
Modifying agency | BD-SySUS. |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Relator code | A01 |
Personal name | KAHATE, |
245 1# - TITLE STATEMENT | |
Title | CRYPTOGRAPHY AND NETWORK SECURITY |
Medium | [electronic resource] / |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 792 p. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Security being one of the main concerns of any organization, this title clearly explains the concepts behind Cryptography and the principles employed behind Network Security. The text steers clear of complex mathematical treatment and presents the concepts involved through easy-to-follow examples and schematic diagrams. This text can very well serve as a main text for students pursuing CSE or IT streams. Key features Uses a bottom-up approach, where introductory topics are followed by topics on Cryptography, Network Security and then Case Studies. Updated coverage of Symmetric Key & Asymetric Key Cryptographic Algorithms, including expanded section on AES, Blowfish, & Digital Certificates. Stress on Case Studies and Practical Implementations of Cryptography. Pedagogical Features: 140 Multiple Choice Questions 135 Exercises 125 Design/Programming Exercises 600 figures New to the Edition: Content on AES, PGP, S/MIME and Blowfish has been expanded. New topics like Birthday Attacks, Trusted Systems, OSI Architecture, Buffer Overflow, and Legal/Ethical Issues added. Chapter on Practical Implementations of Cryptography has been updated by adding .NET Cryptography, TCP/IP Vulnerabilities, and security in OS. Chapter on Network Security has been updated by adding material on NAT (Network Added Translation), Audit Records, and Honeypots. 138 new exercises have been added to the already existing pool of exercises. Chapter on Public Key Infrastructure has been expanded by adding sections on Java and Digital Certificates. Every chapter has undergone extensive revision, whereby a perfect balance has been maintained between mathematics and theory. Rich pedagogy in terms of Exercises and Design/Programming Problems. Good supporting material available on the web site. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://mcgrawhilleducation.pdn.ipublishcentral.com/product/cryptography-network-security7131">http://mcgrawhilleducation.pdn.ipublishcentral.com/product/cryptography-network-security7131</a> |
Public note | Link to access the E-book |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type |
No items available.