MARC details
000 -LEADER |
fixed length control field |
01151nam a22002657a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IIITD |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240229020002.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231204b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789353163303 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
IIITD |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
KAH-C |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kahate, Atul |
245 ## - TITLE STATEMENT |
Title |
Cryptography and network security |
Statement of responsibility, etc |
by Atul Kahate |
250 ## - EDITION STATEMENT |
Edition statement |
4th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
McGraw Hill, |
Place of publication, distribution, etc |
Chennai : |
Date of publication, distribution, etc |
©2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvii, 456 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
This book includes bibliographical references and index |
505 ## - FORMATTED CONTENTS NOTE |
Title |
1. Introduction to the concepts of Security |
-- |
2. Cryptography techniques |
-- |
3. Computer- based Symmetric Key Cryptographic Algorithms |
-- |
4. Computer- based Asymmetric Key Cryptography Algorithms |
-- |
5. Public Key Infrastructure (PKI) |
-- |
6. Internet- Security Protocols |
-- |
7. User- Authentication Mechanisms |
-- |
8. Practical Implementations of Cryptography/ Security |
-- |
9. Network Security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Coding theory |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Public key cryptography |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
Koha issues (borrowed), all copies |
1 |