MARC details
000 -LEADER |
fixed length control field |
03476nam a2200325 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240506131531.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231212b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781788826341 (hardcover) |
040 ## - CATALOGING SOURCE |
Transcribing agency |
Cavite State University - Main Campus Library |
Description conventions |
rda |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.5 |
Item number |
Al2 2022 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Alexander, Joseph |
9 (RLIN) |
40878 |
Relator term |
author |
245 ## - TITLE STATEMENT |
Title |
Cryptography and network security / |
Statement of responsibility, etc. |
Joseph Alexander. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Waltham Abbey Essex, United Kingdom : |
Name of publisher, distributor, etc. |
ED-Tech Press, |
Date of publication, distribution, etc. |
c2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
351 pages : |
Other physical details |
illustrations ; |
Dimensions |
26 cm |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
unmediated |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
volume |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- Fundamentals of Cryptography -- Cryptography and Security -- Computer Security in Information Technology -- Definitions of Network Secure Device -- Mobility and Network Security -- Networking and Security Issues -- Wireless Network Communication and Security -- Risk Management: The Game of Network Security -- Software Design and Security.<br/> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Cryptography is a vital technology that underpins the security of information in computer networks. Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. A computer network is an interconnection of various computer systems located at the same or different places. The interconnection is done through a communication link also known as the physical layer of the network and this link is such that it is totally transparent to the users of the network. The transparency of the communication link is brought about by the interfacing software known as protocols which enables a user in one location to freely access a computer system/database/process/software in another location. Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Securing the Internet presents great challenges and research opportunities. Potential applications such as Internet voting, universally available medical records, and ubiquitous e-commerce are all being hindered because of serious security and privacy concerns. The epidemic of hacker attacks on personal computers and web sites only highlights the inherent vulnerability of the current computer and network infrastructure. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks."--Back cover |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Source of acquisition |
Fund 164 |
Vendor |
Wiseman's Books Trading, Inc. |
Method of acquisition |
Purchased |
Date of acquisition |
08/30/2022 |
Accession number |
80923 |
Owner |
pnr |
Purchase price |
PHP 7,995.00 |
PO No. |
2022-08-634 |
ICS or PAR No. |
2022-1-0743 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
9 (RLIN) |
1769 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
9 (RLIN) |
1769 |
General subdivision |
Management |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography |
9 (RLIN) |
4145 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
9 (RLIN) |
1769 |
General subdivision |
Security measures |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Electronic File |
<a href="http://library.cvsu.edu.ph/cgi-bin/koha/opac-retrieve-file.pl?id=e3bc2616831497f70903d939ead8890b">http://library.cvsu.edu.ph/cgi-bin/koha/opac-retrieve-file.pl?id=e3bc2616831497f70903d939ead8890b</a> |
Link text |
Click here to view the table of contents |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |