Everyday cryptography (Record no. 14345)

000 -LEADER
fixed length control field nam a22 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210216160513.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210216b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780198800705
040 ## - CATALOGING SOURCE
Transcribing agency AIKTC-KRRC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title ENG
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number DDC23
Classification number 005.8
Item number MAR
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 13379
Personal name Martin, Keith M.
245 ## - TITLE STATEMENT
Title Everyday cryptography
Remainder of title : Fundamental principles and applications
250 ## - EDITION STATEMENT
Edition statement 1st
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. Oxford University Press
Date of publication, distribution, etc. 2012
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 530p.
Other physical details | Binding - Paperback |
Dimensions 23.5*15 cm
520 ## - SUMMARY, ETC.
Summary, etc. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research.
Expansion of summary note
Everyday Cryptography is a self-contained and widely accessible introductory text. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms, though a short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this fascinating and increasingly important area of technology.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4622
Topical term or geographic name entry element Computer Engineering
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Text Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type
          Circulation Departmental Library - SOET School of Engineering & Technology Reading Hall 2021-02-16 005.8 MAR DE0060 2021-02-16 2021-02-16 Text Books
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha