Cryptography, network security, and cyber laws (Record no. 2199)

MARC details
000 -LEADER
fixed length control field 02704nam a22002177a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220225112626.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220225b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789386858948
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number MEN
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Menezes, Bernard
245 ## - TITLE STATEMENT
Title Cryptography, network security, and cyber laws
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc. Cengage Learning India Pvt. Ltd.
Place of publication, distribution, etc. New Delhi
Date of publication, distribution, etc. 2018
300 ## - PHYSICAL DESCRIPTION
Extent xix, 488 p.
365 ## - TRADE PRICE
Price type code INR
Price amount 499.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Table of content<br/><br/>1. Introduction<br/><br/>2. Computer Networking Primer<br/><br/>3. Mathematical Background for Cryptography<br/><br/>4. Basics of Cryptography<br/><br/>5. Secret Key Cryptography<br/><br/>6. Public Key Cryptography and RSA<br/><br/>7. Cryptographic Hash<br/><br/>8. Discrete Logarithm and its Applications<br/><br/>9. Elliptic Curve Cryptography and Advanced Encryption Standard<br/><br/>10. Key Management<br/><br/>11. Authentication–I<br/><br/>12. Authentication–II<br/><br/>13. IPSec—Security at the Network Layer<br/><br/>14. Security at the Transport Layer<br/><br/>15. IEEE 802.11 Wireless LAN Security<br/><br/>16. Cellphone Security<br/><br/>17. Non-Cryptographic Protocol Vulnerabilities<br/><br/>18. Software Vulnerabilities<br/><br/>19. Viruses, Worms, and Other Malware<br/><br/>20. Access Control in the Operating System<br/><br/>21. Firewalls<br/><br/>22. Intrusion Prevention and Detection<br/><br/>23. RFIDs and E-Passports<br/><br/>24. Electronic Payment<br/><br/>25. Web Services Security<br/><br/>26. Internet Law and Cyber Crimes<br/><br/>27. The Information Technology Act, 2000
520 ## - SUMMARY, ETC.
Summary, etc. Hardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years.<br/><br/>Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks- Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Ravinder
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Bill No Bill Date Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Accession Number Date last seen Copy number Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     IT & Decisions Sciences TB5369 12-02-2022 Indian Institute of Management LRC Indian Institute of Management LRC General Stacks 02/25/2022 Technical Bureau India Pvt. Ltd. 349.30   005.8 MEN 001942 02/25/2022 1 499.00 02/25/2022 Book

©2019-2020 Learning Resource Centre, Indian Institute of Management Bodhgaya

Powered by Koha