MARC details
| 000 -LEADER |
| fixed length control field |
03342nam a2200313 i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CSPC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260311110351.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
260227s2009 ii a 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9789350146637 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
CSPC |
| Language of cataloging |
eng |
| Transcribing agency |
CSPC |
| Description conventions |
rda |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
TK5105.59 |
| Item number |
.S444 2009 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Item number |
Se41n |
| Edition number |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Sehgal, Umesh, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Network security and cryptography / |
| Statement of responsibility, etc. |
Umesh Sehgal and Kuljeet Kaur. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
First edition. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
New Delhi, India : |
| Name of producer, publisher, distributor, manufacturer |
S.K. Kataria & Sons, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2009 ; Reprint 2022. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
342 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 501 ## - WITH NOTE |
| With note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Unit-I: Introduction to cryptography -- Network security -- Cryptosystem -- Mobility in network -- Network security issues -- Unit-II: Crypto analysis -- Introduction to crypto -- Crypto analysis -- Unit-III: Message authentication and hash function -- Information system -- Security user -- Public key cryptography -- Unit-IV: Authentication algorithm application -- Digital signature algorithm -- Authentication key protocol -- Signature schemes -- Unit-V: Web and system security -- Web security -- System security -- Topology -- Protocol suite -- Trust models -- Firewalls -- Firewalls attacks -- Unit-VI: Security and theorem -- Theorem and algorithm -- Socket layer -- Network layer security -- Session layer -- Security at the application layer -- Entity authentication -- Symmetric key ciphers -- Mathematics of cryptography -- Data encryption standard -- Modern ciphers -- Using algorithms -- Public key algorithm -- Special algorithm for protocols. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"This book covers the encryption techniques, Public key Cryptosystem, concern authentication and Hash function. Also define the application of web system security and advanced standard and algorithms. Written as a text book for undergraduate, Post Graduate courses in Electronics and communications, Computer science, this book presents the subject systematically following the layered architecture approach .It will also be useful for the computer and communications professionals who wish to explore the field of network security but are not familiar with the terminology and the architecture. This book is intended for both a professional and an academic audience. For the professional interested in this field, the book serves as a basic reference volume and is suitable for self study. The book is laid out to present material in a top down fashion. This has the advantage of immediately focusing on the most visible part of the material, the applications, and then seeing, progressively, how each Algo is supported by the next Algo down. This approach makes the most sense for many instructors and students. The application layer is most visible layer to the student and typically provides the most interest. An understanding of the applications motivates the mechanisms found at the Encryption Techniques"-- Preface of the book. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cryptography. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Kaur, Kuljeet, |
| Relator term |
author. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Suppress in OPAC |
No |
| Koha item type |
Books |
| Classification part |
005.8 |
| Item part |
Se41n |
| Call number prefix |
CIR |
| Call number suffix |
2009 |
| Edition |
23 |