Modern Cryptography (Record no. 174234)

MARC details
000 -LEADER
fixed length control field 04244nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-3-031-12304-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125110.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221029s2022 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031123047
-- 978-3-031-12304-7
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-12304-7
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5101-5105.9
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJK
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code TJK
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.382
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Easttom, William.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Modern Cryptography
Medium [electronic resource] :
Remainder of title Applied Mathematics for Encryption and Information Security /
Statement of responsibility, etc by William Easttom.
250 ## - EDITION STATEMENT
Edition statement 2nd ed. 2022.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2022.
300 ## - PHYSICAL DESCRIPTION
Extent XXIV, 453 p. 137 illus., 85 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800’s -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS -- Chapter 14. Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography.
520 ## - SUMMARY, ETC.
Summary, etc This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); Includes a full suite of classroom materials including exercises, Q&A, and examples. .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Number theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Statistics .
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Structures and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Number Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Applied Statistics.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031123030
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031123054
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-12304-7">https://doi.org/10.1007/978-3-031-12304-7</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in