MARC details
| 000 -LEADER |
| fixed length control field |
03137cam a22003858i 4500 |
| 001 - CONTROL NUMBER |
| control field |
23243979 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CSPC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260312115356.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
230725s2024 nju b 001 0 eng c |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2023030470 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781394207480 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
23243979 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
MdU/DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
DLC |
| Modifying agency |
DLC |
| -- |
CSPC |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA268 |
| Item number |
.M34 2024 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.824 |
| Item number |
M311c |
| Edition number |
23/eng/20230807 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Mammeri, Zoubir, |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Cryptography : |
| Remainder of title |
algorithms, protocols, and standards for computer security / |
| Statement of responsibility, etc. |
Zoubir Z Mammeri. |
| 263 ## - PROJECTED PUBLICATION DATE |
| Projected publication date |
2401 |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Hoboken, New Jersey : |
| Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons, Inc., |
| Date of production, publication, distribution, manufacture, or copyright notice |
2024. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxii, 592 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
28 cm. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Introduction to computer security -- Introduction to cryptography -- Mathematical basics and computation algorithms for cryptography -- Symmetric ciphering: historical ciphers -- Hash functions, message authentication codes, and digital signature -- Stream ciphers -- Block ciphers: basics, TDEA, and AES -- Block cipher modes of operation for confidentiality -- Block cipher modes of operation for authentication and confidentiality -- Introduction to security analysis of blocks ciphers -- Introduction to cryptanalysis attacks on symmetric ciphers -- Public-key cryptosystems: RSA and finite field cryptography based schemes -- Public-key cryptosystems: elliptic curve cryptography -- Key management -- Digital certificate, public-key infrastructure, TLS, and Kerberos -- Generation of pseudorandom and prime numbers for cryptographic -- applications. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before.<br/><br/>This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come"-- Amazon.com. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cryptography. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
John Wiley & Sons, |
| Relator term |
publisher. |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
orignew |
| d |
1 |
| e |
ecip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |
| Classification part |
005.824 |
| Item part |
M311c |
| Call number prefix |
CIR |
| Call number suffix |
2024 |
| Suppress in OPAC |
No |
| Edition |
23 |