Modern cryptography : (Record no. 65827)

MARC details
000 -LEADER
fixed length control field 02436cam a2200277 i 4500
001 - CONTROL NUMBER
control field 0000094310
003 - CONTROL NUMBER IDENTIFIER
control field 0001
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180421s2016 nyua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781259588082 (paperback)
Qualifying information paperback
International Standard Book Number 1259588084
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Description conventions rda
Language of cataloging eng
Transcribing agency DLC
Modifying agency YDX
-- CDX
-- YDXCP
-- CHVBK
042 ## - AUTHENTICATION CODE
Authentication code pcc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 005.82
Item number EAS-M
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Easttom, Chuck,
Relator term author.
245 10 - TITLE STATEMENT
Title Modern cryptography :
Medium [Book]
Remainder of title applied mathematics for encryption and information security /
Statement of responsibility, etc. Chuck Easttom.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 394 pages :
Other physical details illustrations ;
Dimensions 23 cm
365 ## - TRADE PRICE
Price type code 01
Price amount 0.00
520 ## - SUMMARY, ETC.
Summary, etc. A Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphers Understand asymmetric cryptography algorithms Design s-boxes that maximize output non-linearity Deploy cryptographic hashes Create cryptographic keys using pseudo random number generators Encrypt Web traffic using SSL/TLS Secure VPN, WiFi, and SSH communications Work with cryptanalysis and steganography Explore government, military, and intelligence agency applications This book is meant for those without a strong mathematics backgound. Only just enough math to understand the algorithms is given. The idea of the book is to be a gateway to enter the world of cryptography.
521 ## - TARGET AUDIENCE NOTE
Target audience note All.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
Topical term or geographic name entry element Information networks
General subdivision Security measures
-- Mathematics.
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Mathematics.
Topical term or geographic name entry element Computer security
General subdivision Mathematics.
852 ## - LOCATION
Piece designation 58068
-- 6099.84
Classification part 005.82 EAS-M
-- Progressive International Agencies Pvt. Ltd. CUI Lahore
Sublocation or collection Ground Floor
Former shelving location Books
Copy number 1
Piece physical condition 1-New
Location JZL-CUI
Holdings
Date last seen Total checkouts Full call number Shelving location Price effective from Koha item type Lost status Damaged status Not for loan Withdrawn status Home library Barcode Current library Date acquired
09/12/2023   005.82 EAS-M Ground Floor 09/12/2023 Books         Junaid Zaidi Library, COMSATS University Islamabad 58068 Junaid Zaidi Library, COMSATS University Islamabad 09/12/2023