Information Security : (Record no. 46159)

MARC details
000 -LEADER
fixed length control field 04007nam a22002297a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250315102610.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250224b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789354644313
040 ## - CATALOGING SOURCE
Transcribing agency VITAP
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd Ed.
Classification number 005.8 STA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark
9 (RLIN) 14615
245 ## - TITLE STATEMENT
Title Information Security :
Remainder of title Principles and Practice /
Statement of responsibility, etc. Mark Stamp and content contribution for Indian adaptation by Ashutosh Saxena
250 ## - EDITION STATEMENT
Edition statement 3rd Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. Wiley India Pvt. Ltd.
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 530p. : ill. 24cm
500 ## - GENERAL NOTE
General note It includes Index Pages,
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note <br/><br/>Preface to the Adapted Edition<br/><br/>Preface to the US Edition<br/><br/>About the Author<br/><br/>Acknowledgments<br/><br/>1 Introduction <br/><br/>1.1 The Cast of Characters <br/><br/>1.2 Alice’s Online Bank <br/><br/>1.3 About This Book <br/><br/>1.4 The People Problem <br/><br/>1.5 Principles and Practice <br/><br/>I Crypto <br/><br/>2 Classic Crypto <br/><br/>2.1 Introduction <br/><br/>2.2 How to Speak Crypto <br/><br/>2.3 Classic Ciphers <br/><br/>2.4 Classic Crypto in History <br/><br/>2.5 Modern Crypto History <br/><br/>2.6 A Taxonomy of Cryptography <br/><br/>2.7 A Taxonomy of Cryptanalysis <br/><br/>3 Symmetric Ciphers <br/><br/>3.1 Introduction <br/><br/>3.2 Stream Ciphers <br/><br/>3.3 Block Ciphers <br/><br/>3.4 Integrity <br/><br/>3.5 Quantum Computers and Symmetric Crypto <br/><br/>4 Public Key Crypto <br/><br/>4.1 Introduction <br/><br/>4.2 Knapsack <br/><br/>4.3 RSA <br/><br/>4.4 Diffie–Hellman <br/><br/>4.5 Elliptic Curve Cryptography <br/><br/>4.6 ElGamal <br/><br/>4.7 Rabin Cryptosystem <br/><br/>4.8 Public Key Notation <br/><br/>4.9 Uses for Public Key Crypto <br/><br/>4.10 Certificates and PKI <br/><br/>4.11 Quantum Computers and Public Key <br/><br/>5 Crypto Hash Functions++ <br/><br/>5.1 Introduction <br/><br/>5.2 What Is a Cryptographic Hash Function? <br/><br/>5.3 The Birthday Problem <br/><br/>5.4 A Birthday Attack <br/><br/>5.5 Non-Cryptographic Hashes <br/><br/>5.6 SHA-3 <br/><br/>5.7 HMAC <br/><br/>5.8 Additional Cryptographic Hash Functions <br/><br/>5.9 Cryptographic Hash Applications <br/><br/>5.10 Miscellaneous Crypto-Related Topics <br/><br/>II Access Control <br/><br/>6 Authentication <br/><br/>6.1 Introduction <br/><br/>6.2 Authentication Methods <br/><br/>6.3 Passwords <br/><br/>6.4 Biometrics <br/><br/>6.5 Something You Have <br/><br/>6.6 Multi-Factor Authentication <br/><br/>6.7 Single Sign-On and Web Cookies <br/><br/>7 Authorization <br/><br/>7.1 Introduction <br/><br/>7.2 A Brief History of Authorization <br/><br/>7.3 Access Control Matrix <br/><br/>7.4 Multilevel Security Models <br/><br/>7.5 Covert Channels <br/><br/>7.6 Inference Control <br/><br/>7.7 CAPTCHA <br/><br/>III Topics in Network Security <br/><br/>8 Network Security Basics <br/><br/>8.1 Introduction <br/><br/>8.2 Networking Basics <br/><br/>8.3 Cross-Site Scripting Attacks <br/><br/>8.4 Firewalls <br/><br/>8.5 Intrusion Detection Systems <br/><br/>9 Simple Authentication Protocols <br/><br/>9.1 Introduction <br/><br/>9.2 Simple Security Protocols <br/><br/>9.3 Authentication Protocols <br/><br/>9.4 “Authentication” and TCP <br/><br/>9.5 Zero Knowledge Proofs <br/><br/>9.6 Tips for Analyzing Protocols <br/><br/>10 Real-World Security Protocols <br/><br/>10.1 Introduction <br/><br/>10.2 SSH <br/><br/>10.3 SSL <br/><br/>10.4 IPsec <br/><br/>10.5 Kerberos <br/><br/>10.6 WEP <br/><br/>10.7 GSM <br/><br/>IV Software <br/><br/>11 Software Flaws and Malware <br/><br/>11.1 Introduction <br/><br/>11.2 Software Flaws <br/><br/>11.3 Malware <br/><br/>11.4 Miscellaneous Software-Based Attacks <br/><br/>12 Insecurity in Software <br/><br/>12.1 Introduction <br/><br/>12.2 Software Reverse Engineering <br/><br/>12.3 Software Development <br/><br/>12.4 Reproducible Builds <br/><br/>12.5 Secure Coding Practices <br/><br/>Summary <br/><br/>Problems <br/><br/>Computer Problem <br/><br/>Multiple Choice Questions <br/><br/>Appendix <br/><br/>A-1 Modular Arithmetic <br/><br/>A-2 Permutations <br/><br/>A-3 Probability <br/><br/>A-4 DES Permutations <br/><br/>A-5 Substitution–Permutation Networks <br/><br/>A-6 Cyber Laws and Forensics <br/><br/>A-7 Digital Rights Management <br/><br/>Bibliography <br/><br/>Index<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information Security
9 (RLIN) 14616
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Saxena, Ashutosh.
Relator term Content Contributor for Indian Adaptation
9 (RLIN) 15248
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.wileyindia.com/information-security-3ed-principles-and-practice-an-indian-adaptation.html">https://www.wileyindia.com/information-security-3ed-principles-and-practice-an-indian-adaptation.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Text Book
Edition 23rd
Classification part 005.8
Call number suffix STA
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type Public note
    Dewey Decimal Classification Paper Back     Reference VIT-AP VIT-AP Reference 2025-02-17 Shah Book House Pvt. Ltd., Hyderabad 909.00 SBH/26868   005.8 STA 022181 2025-02-24 909.00 2025-02-17 Reference Book CSE
    Dewey Decimal Classification Paper Back       VIT-AP VIT-AP General Stacks 2025-02-17 Shah Book House Pvt. Ltd., Hyderabad 909.00 SBH/26868   005.8 STA 022182 2025-02-24 909.00 2025-02-17 Text Book CSE
    Dewey Decimal Classification Paper Back       VIT-AP VIT-AP General Stacks 2025-02-17 Shah Book House Pvt. Ltd., Hyderabad 909.00 SBH/26868   005.8 STA 022183 2025-02-24 909.00 2025-02-17 Text Book CSE
    Dewey Decimal Classification Paper Back       VIT-AP VIT-AP General Stacks 2025-02-17 Shah Book House Pvt. Ltd., Hyderabad 909.00 SBH/26868   005.8 STA 022184 2025-02-24 909.00 2025-02-17 Text Book CSE
    Dewey Decimal Classification Paper Back       VIT-AP VIT-AP General Stacks 2025-02-17 Shah Book House Pvt. Ltd., Hyderabad 909.00 SBH/26868   005.8 STA 022185 2025-02-24 909.00 2025-02-17 Text Book CSE
    Dewey Decimal Classification Paper Back       School of Computer Science Section VIT-AP General Stacks 2025-03-08 Shah Book House Pvt. Ltd. 909.00 SBH/27174   005.8 STA 022903 2025-03-15 909.00 2025-03-15 Text Book CSE
    Dewey Decimal Classification Paper Back       School of Computer Science Section VIT-AP General Stacks 2025-03-08 Shah Book House Pvt. Ltd. 909.00 SBH/27174   005.8 STA 022904 2025-03-15 909.00 2025-03-15 Text Book CSE

Visitor Number:

Powered by Koha