Understanding and applying cryptography and data security (Record no. 12160)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02092cam a22002054a 4500 |
001 - CONTROL NUMBER | |
control field | 15340204 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200825110407.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 080623s2009 fluaa b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781420061604 (alk. paper) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
Item number | E374 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Elbirt, Adam J. |
245 10 - TITLE STATEMENT | |
Title | Understanding and applying cryptography and data security |
Statement of responsibility, etc | / Adam J. Elbirt. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Boca Raton, Fl : |
Name of publisher, distributor, etc | CRC Press, |
Date of publication, distribution, etc | 2009 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxvii, 637 p. : |
Other physical details | ill. ; |
Dimensions | 25 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advanced Encryption StandardPublic-Key Cryptography Issues with Symmetric-Key Cryptosystems Public-Key Cryptosystem Overview One-Way Functions The Euclidean AlgorithmThe Extended Euclidean Algorithm Euler's Phi FunctionEuler's Theorem Fermat's Little Theorem Homework ProblemsPublic-Key Cryptography: RSACryptosystem Efficient ImplementationAttacks Homework ProblemsPublic-Key Cryptography: Discrete Logarithms Cyclic Groups The Discrete Logarithm Problem Diffie-Hellman Key Agreement Protocol Efficient Implementation ElGamal Encryption AttacksHomework ProblemsPublic-Key Cryptography: Elliptic Curves Cryptosystem Diffie-Hellman Key Agreement Protocol Efficient Implementation Menezes-Vanstone Encryption Attacks Homework ProblemsCryptographic Components Digital SignaturesHash FunctionsMessage Authentication CodesCryptographic Protocols Security Services Key EstablishmentApplicationsHomework ProblemsReferencesIndex |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 13.11.2018 | U.E.23943 | 005.8 E374 | T9254 | 24.10.2023 | 13.11.2018 | Books |