Network Security Private Communications In a Public World (Record no. 701325)

MARC details
000 -LEADER
fixed length control field 03359nam a22002897a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230220s2023 |||||||| |||| 00| 0 eng d005.8
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780136643609
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
ISSN-L 9780136643609
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number KAU
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Kaufman, Charlie
9 (RLIN) 158138
Relator term author
245 ## - TITLE STATEMENT
Title Network Security Private Communications In a Public World
250 ## - EDITION STATEMENT
Edition statement 3rd
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston,
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. c2023
300 ## - PHYSICAL DESCRIPTION
Extent XX, 455 p.
Other physical details : ill
490 ## - SERIES STATEMENT
Series statement Pearson Series in Computer Networking and Distributed Systems
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes Bibliographical References and Index
520 ## - SUMMARY, ETC.
Summary, etc. SUMMARY:<br/> A thoroughly-revised edition of the landmark text on computer security<br/><br/>This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.<br/><br/>The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.<br/><br/>Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.<br/><br/>Features<br/><br/> New edition of the classic text on computer security from legendary pioneers in network security<br/> Thoroughly re-written to reflect contemporary issues in cybersecurity<br/> Friendly, intuitive, rigorous, comprehensive, and practical<br/> Includes detailed sections on cryptography, authentication, connection protocols, and network applications<br/> Contains new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication<br/> Illuminates subtle issues missed by books focused solely on implementation details<br/><br/>New to this Edition<br/><br/>All chapters have been thoroughly updated to reflect today's technologies and threat environment. This edition also contains extensive new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 158144
Topical term or geographic name entry element Computers Access Control
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 151656
Topical term or geographic name entry element Computer Security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 948
Topical term or geographic name entry element Electronic Data Processing Departments Security Measures
700 ## - ADDED ENTRY--PERSONAL NAME
Relator term author
Personal name Perlman, Radia
9 (RLIN) 669
700 ## - ADDED ENTRY--PERSONAL NAME
Relator term author
Personal name Speciner, Mike
9 (RLIN) 158139
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text TOC
Uniform Resource Identifier <a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780136643609.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780136643609.pdf</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text WEB LINK
Uniform Resource Identifier <a href="https://www.pearson.ch/Informatik/Addison-Wesley/EAN/9780136643609/Network-Security-Private-Communication-in-a-Public-World">https://www.pearson.ch/Informatik/Addison-Wesley/EAN/9780136643609/Network-Security-Private-Communication-in-a-Public-World</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Physical Form Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Stock Type Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Budget Year Cost, replacement price Accession Date Koha item type
    Dewey Decimal Classification Text, Hardcover     TIEST (Thar) Library TIEST (Thar) Library Computer Science & Information Technology - Thar Institute 15/02/2023 22 Purchased 14106.98   005.8 KAU 98020 15/02/2023 2022-23 16596.45 15/02/2023 Reference Collection
    Dewey Decimal Classification Text, Hardcover     TIEST (Thar) Library TIEST (Thar) Library Computer Science & Information Technology - Thar Institute 15/02/2023 22 Purchased 14106.98   005.8 KAU 98021 15/02/2023 2022-23 16596.45 15/02/2023 Reference Collection