MARC details
000 -LEADER |
fixed length control field |
03359nam a22002897a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230220s2023 |||||||| |||| 00| 0 eng d005.8 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780136643609 |
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER |
ISSN-L |
9780136643609 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
KAU |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kaufman, Charlie |
9 (RLIN) |
158138 |
Relator term |
author |
245 ## - TITLE STATEMENT |
Title |
Network Security Private Communications In a Public World |
250 ## - EDITION STATEMENT |
Edition statement |
3rd |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, |
Name of publisher, distributor, etc. |
Addison-Wesley, |
Date of publication, distribution, etc. |
c2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XX, 455 p. |
Other physical details |
: ill |
490 ## - SERIES STATEMENT |
Series statement |
Pearson Series in Computer Networking and Distributed Systems |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes Bibliographical References and Index |
520 ## - SUMMARY, ETC. |
Summary, etc. |
SUMMARY:<br/> A thoroughly-revised edition of the landmark text on computer security<br/><br/>This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth.<br/><br/>The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation.<br/><br/>Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies.<br/><br/>Features<br/><br/> New edition of the classic text on computer security from legendary pioneers in network security<br/> Thoroughly re-written to reflect contemporary issues in cybersecurity<br/> Friendly, intuitive, rigorous, comprehensive, and practical<br/> Includes detailed sections on cryptography, authentication, connection protocols, and network applications<br/> Contains new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication<br/> Illuminates subtle issues missed by books focused solely on implementation details<br/><br/>New to this Edition<br/><br/>All chapters have been thoroughly updated to reflect today's technologies and threat environment. This edition also contains extensive new coverage of quantum computing, post-quantum algorithms, electronic money, homomorphic encryption, and secure multiparty communication. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
158144 |
Topical term or geographic name entry element |
Computers Access Control |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
151656 |
Topical term or geographic name entry element |
Computer Security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
948 |
Topical term or geographic name entry element |
Electronic Data Processing Departments Security Measures |
700 ## - ADDED ENTRY--PERSONAL NAME |
Relator term |
author |
Personal name |
Perlman, Radia |
9 (RLIN) |
669 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Relator term |
author |
Personal name |
Speciner, Mike |
9 (RLIN) |
158139 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
TOC |
Uniform Resource Identifier |
<a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780136643609.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780136643609.pdf</a> |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
WEB LINK |
Uniform Resource Identifier |
<a href="https://www.pearson.ch/Informatik/Addison-Wesley/EAN/9780136643609/Network-Security-Private-Communication-in-a-Public-World">https://www.pearson.ch/Informatik/Addison-Wesley/EAN/9780136643609/Network-Security-Private-Communication-in-a-Public-World</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |