MARC details
000 -LEADER |
fixed length control field |
02704nam a22002177a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220225112626.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220225b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9789386858948 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
MEN |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Menezes, Bernard |
245 ## - TITLE STATEMENT |
Title |
Cryptography, network security, and cyber laws |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc. |
Cengage Learning India Pvt. Ltd. |
Place of publication, distribution, etc. |
New Delhi |
Date of publication, distribution, etc. |
2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 488 p. |
365 ## - TRADE PRICE |
Price type code |
INR |
Price amount |
499.00 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Table of content<br/><br/>1. Introduction<br/><br/>2. Computer Networking Primer<br/><br/>3. Mathematical Background for Cryptography<br/><br/>4. Basics of Cryptography<br/><br/>5. Secret Key Cryptography<br/><br/>6. Public Key Cryptography and RSA<br/><br/>7. Cryptographic Hash<br/><br/>8. Discrete Logarithm and its Applications<br/><br/>9. Elliptic Curve Cryptography and Advanced Encryption Standard<br/><br/>10. Key Management<br/><br/>11. Authentication–I<br/><br/>12. Authentication–II<br/><br/>13. IPSec—Security at the Network Layer<br/><br/>14. Security at the Transport Layer<br/><br/>15. IEEE 802.11 Wireless LAN Security<br/><br/>16. Cellphone Security<br/><br/>17. Non-Cryptographic Protocol Vulnerabilities<br/><br/>18. Software Vulnerabilities<br/><br/>19. Viruses, Worms, and Other Malware<br/><br/>20. Access Control in the Operating System<br/><br/>21. Firewalls<br/><br/>22. Intrusion Prevention and Detection<br/><br/>23. RFIDs and E-Passports<br/><br/>24. Electronic Payment<br/><br/>25. Web Services Security<br/><br/>26. Internet Law and Cyber Crimes<br/><br/>27. The Information Technology Act, 2000 |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Hardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years.<br/><br/>Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks- Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science) |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kumar, Ravinder |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |