Everyday cryptography (Record no. 14345)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | nam a22 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20210216160513.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210216b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780198800705 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | AIKTC-KRRC |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | ENG |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | DDC23 |
Classification number | 005.8 |
Item number | MAR |
100 ## - MAIN ENTRY--PERSONAL NAME | |
9 (RLIN) | 13379 |
Personal name | Martin, Keith M. |
245 ## - TITLE STATEMENT | |
Title | Everyday cryptography |
Remainder of title | : Fundamental principles and applications |
250 ## - EDITION STATEMENT | |
Edition statement | 1st |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New Delhi |
Name of publisher, distributor, etc. | Oxford University Press |
Date of publication, distribution, etc. | 2012 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxi, 530p. |
Other physical details | | Binding - Paperback | |
Dimensions | 23.5*15 cm |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research. |
Expansion of summary note | Everyday Cryptography is a self-contained and widely accessible introductory text. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms, though a short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this fascinating and increasingly important area of technology. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 4622 |
Topical term or geographic name entry element | Computer Engineering |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Text Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Shelving location | Date acquired | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Circulation | Departmental Library - SOET | School of Engineering & Technology | Reading Hall | 2021-02-16 | 005.8 MAR | DE0060 | 2021-02-16 | 2021-02-16 | Text Books |