opac header image

Modern cryptography : (Record no. 35667)

MARC details
000 -LEADER
fixed length control field 02694nam a22003857a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250215143806.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250215b |||||||| |||| 00| 0 hin d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030631178
040 ## - CATALOGING SOURCE
Original cataloging agency NISER LIBRARY
Language of cataloging eng
Transcribing agency NISER LIBRARY
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 003.26:511
Item number EAS-M
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Easttom, William
245 10 - TITLE STATEMENT
Title Modern cryptography :
Remainder of title applied mathematics for encryption and information security
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Cham, Switzerland :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. 2021
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 390 p. :
Other physical details illutrations (76 b/w illustrations, 85 illustrations in colour)
Dimensions 23 cm
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. This textbook is a practical yet in depth guide to cryptography and its principles and practices. The book places cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background _ only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. <br/><br/>Presents a comprehensive coverage of cryptography in an approachable format;<br/>Covers the basic math needed for cryptography _ number theory, discrete math, and algebra (abstract and linear);<br/>Includes a full suite of classroom materials including exercises, Q&A, and examples.<br/><br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information networks
General subdivision Security measures
-- Mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational intelligence
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information theory
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Number theory and discrete math
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Steganography
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptanalysis
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Quantum computers and cryptography
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electrical engineering
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Statistics
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures (Computer science)
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of content
Uniform Resource Identifier <a href="https://link.springer.com/content/pdf/bfm:978-3-030-63115-4/1">https://link.springer.com/content/pdf/bfm:978-3-030-63115-4/1</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Reviews
Uniform Resource Identifier <a href="https://www.goodreads.com/book/show/61177403-modern-cryptography#CommunityReviews">https://www.goodreads.com/book/show/61177403-modern-cryptography#CommunityReviews</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Universal Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Price effective from Koha item type
    Universal Decimal Classification     NISER LIBRARY NISER LIBRARY 12/02/2025 Order No. NISER/LIB/BK/PO/2024-25/40, Dt. 16/01/2025; Overseas Press India Private Limited; Invoice No. IN32038, Dt. 23/01/2025 1 6 003.26:511 EAS-M 25678 04/12/2025 21/08/2025 15/02/2025 Book