Cryptography and network security / (Record no. 63984)

000 -LEADER
fixed length control field 01661cam a2200241 a 4500
001 - CONTROL NUMBER
control field vtls003055085
003 - CONTROL NUMBER IDENTIFIER
control field MY-SjTCS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200306170619.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 070816s2008 maua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071263610 (pbk., Int. ed.)
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE]
Level of rules in bibliographic description 200708171323
Level of effort used to assign nonsubject heading access points pushpa
-- 200708161458
-- malathy
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number FOR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Forouzan, Behrouz A.
9 (RLIN) 9190
245 10 - TITLE STATEMENT
Title Cryptography and network security /
Statement of responsibility, etc. Behrouz A. Forouzan.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. McGraw Hill,
Date of publication, distribution, etc. 2008
300 ## - PHYSICAL DESCRIPTION
Extent xxvi, 721 p. :
Other physical details ill. ;
Dimensions 23 cm.
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title McGraw-Hill Forouzan networking series
9 (RLIN) 14593
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 707-708) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- Part 1 Symmetric-Key encipherment: 2. Mathematics of Cryptography - 3. Traditional Symmetric-Key Ciphers - 4. Mathematics of Cryptography - 5. Introduction to Modern Symmetric-Key Ciphers - 6. Data Encryption Standard (DES) - 7. Advanced Encryption Standard (AES) - 8. Encipherment using modern Symmetric-Key Ciphers -- Part 2 Asymmetric-Key Encipherment: 9. Mathematics of Cryptography - 10. Asymmetric-Key Cryptography -- Part 3. Integrity, Authentication, and Key Management: 11. Message integrity and message authentication - 12. Cryptographic hash functions - 13. Digital signature - 14. Entity authentication - 15. Key management -- Part 4 Network security: 16. Security at the application layer: PGP and S/MIME - 17. Security at the transport layer: SSL and TLS - 18. Security at the network layer: IP Sec -- Appendix
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 9098
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 288289
920 ## - Programme
Programme CIT(RMIT) : 547489
999 ## - SYSTEM CONTROL NUMBERS (KOHA)
Koha biblionumber 63984
Koha biblioitemnumber 63984
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Total Checkouts Barcode Date last seen Date last checked out Copy number Uniform Resource Identifier Koha item type Public note
          Taylor's Library-TU Taylor's Library-TU 2007-08-16 11 5000115170 2019-12-05 2012-10-24 1 Floor 3, Shelf 2 , Side 1, TierNo 1, BayNo 1 Main Collection SOCIT,15009,03,GR