Learning Resource and Development

Network security and cryptography / (Record no. 31919)

MARC details
000 -LEADER
fixed length control field 03342nam a2200313 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260311110351.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 260227s2009 ii a 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789350146637
040 ## - CATALOGING SOURCE
Original cataloging agency CSPC
Language of cataloging eng
Transcribing agency CSPC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .S444 2009
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number Se41n
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sehgal, Umesh,
Relator term author.
245 10 - TITLE STATEMENT
Title Network security and cryptography /
Statement of responsibility, etc. Umesh Sehgal and Kuljeet Kaur.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New Delhi, India :
Name of producer, publisher, distributor, manufacturer S.K. Kataria & Sons,
Date of production, publication, distribution, manufacture, or copyright notice 2009 ; Reprint 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 342 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
501 ## - WITH NOTE
With note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Unit-I: Introduction to cryptography -- Network security -- Cryptosystem -- Mobility in network -- Network security issues -- Unit-II: Crypto analysis -- Introduction to crypto -- Crypto analysis -- Unit-III: Message authentication and hash function -- Information system -- Security user -- Public key cryptography -- Unit-IV: Authentication algorithm application -- Digital signature algorithm -- Authentication key protocol -- Signature schemes -- Unit-V: Web and system security -- Web security -- System security -- Topology -- Protocol suite -- Trust models -- Firewalls -- Firewalls attacks -- Unit-VI: Security and theorem -- Theorem and algorithm -- Socket layer -- Network layer security -- Session layer -- Security at the application layer -- Entity authentication -- Symmetric key ciphers -- Mathematics of cryptography -- Data encryption standard -- Modern ciphers -- Using algorithms -- Public key algorithm -- Special algorithm for protocols.
520 ## - SUMMARY, ETC.
Summary, etc. "This book covers the encryption techniques, Public key Cryptosystem, concern authentication and Hash function. Also define the application of web system security and advanced standard and algorithms. Written as a text book for undergraduate, Post Graduate courses in Electronics and communications, Computer science, this book presents the subject systematically following the layered architecture approach .It will also be useful for the computer and communications professionals who wish to explore the field of network security but are not familiar with the terminology and the architecture. This book is intended for both a professional and an academic audience. For the professional interested in this field, the book serves as a basic reference volume and is suitable for self study. The book is laid out to present material in a top down fashion. This has the advantage of immediately focusing on the most visible part of the material, the applications, and then seeing, progressively, how each Algo is supported by the next Algo down. This approach makes the most sense for many instructors and students. The application layer is most visible layer to the student and typically provides the most interest. An understanding of the applications motivates the mechanisms found at the Encryption Techniques"-- Preface of the book.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kaur, Kuljeet,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Suppress in OPAC No
Koha item type Books
Classification part 005.8
Item part Se41n
Call number prefix CIR
Call number suffix 2009
Edition 23
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Circulation Section 02/27/2026   CIR 005.8 Se41n 2009 031400 02/27/2026 1-1 02/27/2026 Books