Learning Resource and Development

Cryptography : (Record no. 32045)

MARC details
000 -LEADER
fixed length control field 03137cam a22003858i 4500
001 - CONTROL NUMBER
control field 23243979
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260312115356.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230725s2024 nju b 001 0 eng c
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2023030470
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781394207480
035 ## - SYSTEM CONTROL NUMBER
System control number 23243979
040 ## - CATALOGING SOURCE
Original cataloging agency MdU/DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
-- CSPC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
Item number .M34 2024
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Item number M311c
Edition number 23/eng/20230807
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mammeri, Zoubir,
Relator term author.
245 10 - TITLE STATEMENT
Title Cryptography :
Remainder of title algorithms, protocols, and standards for computer security /
Statement of responsibility, etc. Zoubir Z Mammeri.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2401
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc.,
Date of production, publication, distribution, manufacture, or copyright notice 2024.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 592 pages :
Other physical details illustrations ;
Dimensions 28 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to computer security -- Introduction to cryptography -- Mathematical basics and computation algorithms for cryptography -- Symmetric ciphering: historical ciphers -- Hash functions, message authentication codes, and digital signature -- Stream ciphers -- Block ciphers: basics, TDEA, and AES -- Block cipher modes of operation for confidentiality -- Block cipher modes of operation for authentication and confidentiality -- Introduction to security analysis of blocks ciphers -- Introduction to cryptanalysis attacks on symmetric ciphers -- Public-key cryptosystems: RSA and finite field cryptography based schemes -- Public-key cryptosystems: elliptic curve cryptography -- Key management -- Digital certificate, public-key infrastructure, TLS, and Kerberos -- Generation of pseudorandom and prime numbers for cryptographic -- applications.
520 ## - SUMMARY, ETC.
Summary, etc. "Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before.<br/><br/>This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come"-- Amazon.com.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element John Wiley & Sons,
Relator term publisher.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Classification part 005.824
Item part M311c
Call number prefix CIR
Call number suffix 2024
Suppress in OPAC No
Edition 23
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Circulation Section 03/12/2026   CIR 005.824 M311c 2024 031362 03/12/2026 1-1 03/12/2026 Books