Learning Resource and Development

Cryptography and network security / (Record no. 30803)

MARC details
000 -LEADER
fixed length control field 03242nam a2200301 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251125141911.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251027r20222024-uka b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781788826341
040 ## - CATALOGING SOURCE
Original cataloging agency CSPC
Language of cataloging eng
Transcribing agency CSPC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5102.94
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Item number Al261c
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Alexander, Joseph,
Relator term author.
245 10 - TITLE STATEMENT
Title Cryptography and network security /
Statement of responsibility, etc. Joseph Alexander.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London, United Kingdom :
Name of producer, publisher, distributor, manufacturer Ed-Tech Press,
Date of production, publication, distribution, manufacture, or copyright notice 2022 ; Reprinted 2024.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 351 pages :
Other physical details illustrations ;
Dimensions 26 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Fundamentals of cryptography -- Cryptography and security -- Computer security in information technology -- Definitions of network secure device -- Mobility and network security -- Networking and security issues -- Wireless network communication and security -- Risk management: the game of network security -- Software design security.
520 ## - SUMMARY, ETC.
Summary, etc. "Cryptography is a vital technology that underpins the security of information in computer networks. Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. A computer network is an interconnection of various computer systems located at the same or different places. The interconnection is done through a communication link also known as the physical layer of the network and this link is such that it is totally transparent to the users of the network. The transparency of the communication link is brought about by the interfacing software known as protocols which enables a user in one location to freely access a computer system/database/process/software in another location. Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Securing the Internet presents great challenges and research opportunities. Potential applications such as Internet voting, universally available medical records, and ubiquitous e-commerce are all being hindered because of serious security and privacy concerns. The epidemic of hacker attacks on personal computers and web sites only highlights the inherent vulnerability of the current computer and network infrastructure. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks." -- Back cover
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Suppress in OPAC No
Koha item type Books
Classification part 005.824
Item part Al261c
Call number prefix CIR
Call number suffix 2022
Edition 23
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Circulation Section 10/27/2025   CIR 005.824 Al261c 2022 030692 10/27/2025 1-1 10/27/2025 Books