MARC details
000 -LEADER |
fixed length control field |
02831nam a22003257a 4500 |
001 - CONTROL NUMBER |
control field |
22657086 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240817114130.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220616s2022 nju 000 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2022941173 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9788196874339 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
KAU-N |
245 10 - TITLE STATEMENT |
Title |
Network security : |
Remainder of title |
private communications in a public world |
Statement of responsibility, etc |
by Charlie Kaufman ... [et al.] |
250 ## - EDITION STATEMENT |
Edition statement |
3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Noida : |
Name of publisher, distributor, etc |
Pearson, |
Date of publication, distribution, etc |
©2024 |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
2209 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 429 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
1. Introduction |
-- |
2. Introduction to Cryptography |
-- |
3. Secret Key Cryptography |
-- |
4. Modes of Operation |
-- |
5. Cryptographic Hashes |
-- |
6. First-Generation Public Key Algorithms |
-- |
7. Quantum Computing |
-- |
8. Post-Quantum Cryptography |
-- |
9. Authentication of People |
-- |
10. Trusted Intermediaries |
-- |
11. Communication Session Establishment |
-- |
13. SSL/TLS and SSH |
-- |
14. Electronic Mail Security |
-- |
15. Electronic Money |
-- |
16. Cryptographic Tricks |
-- |
17. Folklore |
520 ## - SUMMARY, ETC. |
Summary, etc |
"With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies"-- |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Network Security |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kaufman, Charlie |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Perlman, Radia |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Speciner, Mike |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Perlner, Ray |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
0 |
b |
ibc |
c |
orignew |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |