000 -LEADER |
fixed length control field |
01661cam a2200241 a 4500 |
001 - CONTROL NUMBER |
control field |
vtls003055085 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
MY-SjTCS |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200306170619.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
070816s2008 maua b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071263610 (pbk., Int. ed.) |
039 #9 - LEVEL OF BIBLIOGRAPHIC CONTROL AND CODING DETAIL [OBSOLETE] |
Level of rules in bibliographic description |
200708171323 |
Level of effort used to assign nonsubject heading access points |
pushpa |
-- |
200708161458 |
-- |
malathy |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Item number |
FOR |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Forouzan, Behrouz A. |
9 (RLIN) |
9190 |
245 10 - TITLE STATEMENT |
Title |
Cryptography and network security / |
Statement of responsibility, etc. |
Behrouz A. Forouzan. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston : |
Name of publisher, distributor, etc. |
McGraw Hill, |
Date of publication, distribution, etc. |
2008 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvi, 721 p. : |
Other physical details |
ill. ; |
Dimensions |
23 cm. |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
McGraw-Hill Forouzan networking series |
9 (RLIN) |
14593 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. 707-708) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction -- Part 1 Symmetric-Key encipherment: 2. Mathematics of Cryptography - 3. Traditional Symmetric-Key Ciphers - 4. Mathematics of Cryptography - 5. Introduction to Modern Symmetric-Key Ciphers - 6. Data Encryption Standard (DES) - 7. Advanced Encryption Standard (AES) - 8. Encipherment using modern Symmetric-Key Ciphers -- Part 2 Asymmetric-Key Encipherment: 9. Mathematics of Cryptography - 10. Asymmetric-Key Cryptography -- Part 3. Integrity, Authentication, and Key Management: 11. Message integrity and message authentication - 12. Cryptographic hash functions - 13. Digital signature - 14. Entity authentication - 15. Key management -- Part 4 Network security: 16. Security at the application layer: PGP and S/MIME - 17. Security at the transport layer: SSL and TLS - 18. Security at the network layer: IP Sec -- Appendix |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
9098 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography. |
9 (RLIN) |
288289 |
920 ## - Programme |
Programme |
CIT(RMIT) : 547489 |
999 ## - SYSTEM CONTROL NUMBERS (KOHA) |
Koha biblionumber |
63984 |
Koha biblioitemnumber |
63984 |