Computer security and cryptography / (Record no. 1939)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080324s2007 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2006049338
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780471947837
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u291
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Konheim, Alan G.,
Dates associated with a name 1934-
9 (RLIN) 5462
245 10 - TITLE STATEMENT
Title Computer security and cryptography /
Statement of responsibility, etc. Alan G. Konheim.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hoboken, N.J. :
Name of publisher, distributor, etc. Wiley-Interscience,
Date of publication, distribution, etc. c2007.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 521 p. :
Other physical details ill. ;
Dimensions 27 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note aperitifs -- columnar transposition -- monoalphabetic substitution -- polyalphabetic substitution -- statistical tests -- the emergence of cipher machines -- the japanese cipher machines -- stream ciphers -- block-ciphers: lucifer, des, and aes -- the paradigm of public key cryptography -- the knapsack cryptosystem -- the rsa cryptosystem -- prime numbers and factorization -- the discrete logarithm problem -- elliptic curve cryptography -- key exchange in a network -- digital signatures and authentication -- applications of cryptography -- cryptographic patents.
520 ## - SUMMARY, ETC.
Summary, etc. Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work. Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 5463
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 378
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   005.8 / KO.C 2007 000530 11/24/2019 1 11/24/2019 Books