Information Security : (Record no. 46159)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04007nam a22002297a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250315102610.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250224b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789354644313 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | VITAP |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23rd Ed. |
Classification number | 005.8 STA |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stamp, Mark |
9 (RLIN) | 14615 |
245 ## - TITLE STATEMENT | |
Title | Information Security : |
Remainder of title | Principles and Practice / |
Statement of responsibility, etc. | Mark Stamp and content contribution for Indian adaptation by Ashutosh Saxena |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | New Delhi |
Name of publisher, distributor, etc. | Wiley India Pvt. Ltd. |
Date of publication, distribution, etc. | 2023 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxii, 530p. : ill. 24cm |
500 ## - GENERAL NOTE | |
General note | It includes Index Pages, |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | <br/><br/>Preface to the Adapted Edition<br/><br/>Preface to the US Edition<br/><br/>About the Author<br/><br/>Acknowledgments<br/><br/>1 Introduction <br/><br/>1.1 The Cast of Characters <br/><br/>1.2 Alice’s Online Bank <br/><br/>1.3 About This Book <br/><br/>1.4 The People Problem <br/><br/>1.5 Principles and Practice <br/><br/>I Crypto <br/><br/>2 Classic Crypto <br/><br/>2.1 Introduction <br/><br/>2.2 How to Speak Crypto <br/><br/>2.3 Classic Ciphers <br/><br/>2.4 Classic Crypto in History <br/><br/>2.5 Modern Crypto History <br/><br/>2.6 A Taxonomy of Cryptography <br/><br/>2.7 A Taxonomy of Cryptanalysis <br/><br/>3 Symmetric Ciphers <br/><br/>3.1 Introduction <br/><br/>3.2 Stream Ciphers <br/><br/>3.3 Block Ciphers <br/><br/>3.4 Integrity <br/><br/>3.5 Quantum Computers and Symmetric Crypto <br/><br/>4 Public Key Crypto <br/><br/>4.1 Introduction <br/><br/>4.2 Knapsack <br/><br/>4.3 RSA <br/><br/>4.4 Diffie–Hellman <br/><br/>4.5 Elliptic Curve Cryptography <br/><br/>4.6 ElGamal <br/><br/>4.7 Rabin Cryptosystem <br/><br/>4.8 Public Key Notation <br/><br/>4.9 Uses for Public Key Crypto <br/><br/>4.10 Certificates and PKI <br/><br/>4.11 Quantum Computers and Public Key <br/><br/>5 Crypto Hash Functions++ <br/><br/>5.1 Introduction <br/><br/>5.2 What Is a Cryptographic Hash Function? <br/><br/>5.3 The Birthday Problem <br/><br/>5.4 A Birthday Attack <br/><br/>5.5 Non-Cryptographic Hashes <br/><br/>5.6 SHA-3 <br/><br/>5.7 HMAC <br/><br/>5.8 Additional Cryptographic Hash Functions <br/><br/>5.9 Cryptographic Hash Applications <br/><br/>5.10 Miscellaneous Crypto-Related Topics <br/><br/>II Access Control <br/><br/>6 Authentication <br/><br/>6.1 Introduction <br/><br/>6.2 Authentication Methods <br/><br/>6.3 Passwords <br/><br/>6.4 Biometrics <br/><br/>6.5 Something You Have <br/><br/>6.6 Multi-Factor Authentication <br/><br/>6.7 Single Sign-On and Web Cookies <br/><br/>7 Authorization <br/><br/>7.1 Introduction <br/><br/>7.2 A Brief History of Authorization <br/><br/>7.3 Access Control Matrix <br/><br/>7.4 Multilevel Security Models <br/><br/>7.5 Covert Channels <br/><br/>7.6 Inference Control <br/><br/>7.7 CAPTCHA <br/><br/>III Topics in Network Security <br/><br/>8 Network Security Basics <br/><br/>8.1 Introduction <br/><br/>8.2 Networking Basics <br/><br/>8.3 Cross-Site Scripting Attacks <br/><br/>8.4 Firewalls <br/><br/>8.5 Intrusion Detection Systems <br/><br/>9 Simple Authentication Protocols <br/><br/>9.1 Introduction <br/><br/>9.2 Simple Security Protocols <br/><br/>9.3 Authentication Protocols <br/><br/>9.4 “Authentication” and TCP <br/><br/>9.5 Zero Knowledge Proofs <br/><br/>9.6 Tips for Analyzing Protocols <br/><br/>10 Real-World Security Protocols <br/><br/>10.1 Introduction <br/><br/>10.2 SSH <br/><br/>10.3 SSL <br/><br/>10.4 IPsec <br/><br/>10.5 Kerberos <br/><br/>10.6 WEP <br/><br/>10.7 GSM <br/><br/>IV Software <br/><br/>11 Software Flaws and Malware <br/><br/>11.1 Introduction <br/><br/>11.2 Software Flaws <br/><br/>11.3 Malware <br/><br/>11.4 Miscellaneous Software-Based Attacks <br/><br/>12 Insecurity in Software <br/><br/>12.1 Introduction <br/><br/>12.2 Software Reverse Engineering <br/><br/>12.3 Software Development <br/><br/>12.4 Reproducible Builds <br/><br/>12.5 Secure Coding Practices <br/><br/>Summary <br/><br/>Problems <br/><br/>Computer Problem <br/><br/>Multiple Choice Questions <br/><br/>Appendix <br/><br/>A-1 Modular Arithmetic <br/><br/>A-2 Permutations <br/><br/>A-3 Probability <br/><br/>A-4 DES Permutations <br/><br/>A-5 Substitution–Permutation Networks <br/><br/>A-6 Cyber Laws and Forensics <br/><br/>A-7 Digital Rights Management <br/><br/>Bibliography <br/><br/>Index<br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information Security |
9 (RLIN) | 14616 |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Saxena, Ashutosh. |
Relator term | Content Contributor for Indian Adaptation |
9 (RLIN) | 15248 |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://www.wileyindia.com/information-security-3ed-principles-and-practice-an-indian-adaptation.html">https://www.wileyindia.com/information-security-3ed-principles-and-practice-an-indian-adaptation.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Text Book |
Edition | 23rd |
Classification part | 005.8 |
Call number suffix | STA |
Withdrawn status | Lost status | Source of classification or shelving scheme | Materials specified (bound volume or other part) | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type | Public note |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Paper Back | Reference | VIT-AP | VIT-AP | Reference | 2025-02-17 | Shah Book House Pvt. Ltd., Hyderabad | 909.00 | SBH/26868 | 005.8 STA | 022181 | 2025-02-24 | 909.00 | 2025-02-17 | Reference Book | CSE | |||||
Dewey Decimal Classification | Paper Back | VIT-AP | VIT-AP | General Stacks | 2025-02-17 | Shah Book House Pvt. Ltd., Hyderabad | 909.00 | SBH/26868 | 005.8 STA | 022182 | 2025-02-24 | 909.00 | 2025-02-17 | Text Book | CSE | ||||||
Dewey Decimal Classification | Paper Back | VIT-AP | VIT-AP | General Stacks | 2025-02-17 | Shah Book House Pvt. Ltd., Hyderabad | 909.00 | SBH/26868 | 005.8 STA | 022183 | 2025-02-24 | 909.00 | 2025-02-17 | Text Book | CSE | ||||||
Dewey Decimal Classification | Paper Back | VIT-AP | VIT-AP | General Stacks | 2025-02-17 | Shah Book House Pvt. Ltd., Hyderabad | 909.00 | SBH/26868 | 005.8 STA | 022184 | 2025-02-24 | 909.00 | 2025-02-17 | Text Book | CSE | ||||||
Dewey Decimal Classification | Paper Back | VIT-AP | VIT-AP | General Stacks | 2025-02-17 | Shah Book House Pvt. Ltd., Hyderabad | 909.00 | SBH/26868 | 005.8 STA | 022185 | 2025-02-24 | 909.00 | 2025-02-17 | Text Book | CSE | ||||||
Dewey Decimal Classification | Paper Back | School of Computer Science Section | VIT-AP | General Stacks | 2025-03-08 | Shah Book House Pvt. Ltd. | 909.00 | SBH/27174 | 005.8 STA | 022903 | 2025-03-15 | 909.00 | 2025-03-15 | Text Book | CSE | ||||||
Dewey Decimal Classification | Paper Back | School of Computer Science Section | VIT-AP | General Stacks | 2025-03-08 | Shah Book House Pvt. Ltd. | 909.00 | SBH/27174 | 005.8 STA | 022904 | 2025-03-15 | 909.00 | 2025-03-15 | Text Book | CSE |