Design and analysis of security protocol for communication / (Record no. 12685)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07160cam a2200769 i 4500 |
001 - CONTROL NUMBER | |
control field | on1139536172 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125542.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200206s2020 nju ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DG1 |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | DG1 |
Modifying agency | DG1 |
-- | EBLCP |
-- | AU@ |
-- | UKAHL |
-- | DG1 |
-- | OCLCQ |
-- | YDX |
-- | UKMGB |
-- | S2H |
-- | UMI |
-- | OCLCO |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCL |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBC013545 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 019690871 |
Source | Uk |
019 ## - | |
-- | 1141200499 |
-- | 1222919934 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119555759 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119555752 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119555742 |
Qualifying information | (ePub ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119555744 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119555766 |
Qualifying information | (PDF ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119555760 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119555643 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119555647 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000066723584 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 001077492 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 582680409 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 019690871 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1139536172 |
Canceled/invalid control number | (OCoLC)1141200499 |
-- | (OCoLC)1222919934 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9781119555742 |
Source of stock number/acquisition | Wiley |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
Item number | .D468 2020eb |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
245 00 - TITLE STATEMENT | |
Title | Design and analysis of security protocol for communication / |
Statement of responsibility, etc. | edited by Dinesh Goyal, A. Balamurigan, Sheng-Lung Peng and O.P. Verma. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, Inc. ; |
Place of production, publication, distribution, manufacture | Salem, Massachusetts : |
Name of producer, publisher, distributor, manufacturer | Scrivener Publishing LLC, |
Date of production, publication, distribution, manufacture, or copyright notice | [2020] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"-- |
Assigning source | Provided by publisher |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Print version record. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL) |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.2 Classical Encryption Techniques -- 2.2.1 Substitution Based -- 2.2.1.1 Caesar Cipher -- 2.2.1.2 Monoalphabetic Cipher -- 2.2.1.3 Playfair Cipher -- 2.2.1.4 Polyalphabetic Cipher -- 2.2.2 Transposition Based -- 2.2.2.1 Simple Columnar -- 2.2.2.2 Rail Fence Cipher -- 2.3 Evolutions of Modern Security Techniques -- 2.3.1 Stream Cipher Algorithms -- 2.3.1.1 One Time Pad (OTP) -- 2.3.1.2 RC-4 -- 2.3.1.3 A5/1 -- 2.3.2 Block Cipher Algorithms -- 2.3.2.1 Feistel Cipher Structure -- 2.3.2.2 Data Encryption Standard (DES) -- 2.3.2.3 Triple Data Encryption Standard (TDES) |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.3.2.4 International Data Encryption Algorithm (IDEA) -- 2.3.2.5 Blowfish -- 2.3.2.6 CAST-128 -- 2.4 Conclusion -- References -- Practice Set -- Review Questions and Exercises -- 3 Philosophy of Security by Cryptostakes Schemes -- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) -- 3.2 RSA Algorithm -- 3.3 Security Analysis of RSA -- 3.4 Exponentiation in Modular Arithmetic -- 3.5 Distribution of Public Keys -- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems -- 3.7 Discrete Logarithms -- 3.8 Diffie-Hellman Key Exchange -- 3.9 Review Exercise -- References |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer network protocols. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | R�eseaux d'ordinateurs |
General subdivision | S�ecurit�e |
-- | Mesures. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Protocoles de r�eseaux d'ordinateurs. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer network protocols |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures |
Source of heading or term | fast |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Goyal, Dinesh, |
Dates associated with a name | 1976- |
Relator term | editor. |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCjt9jX6w94WJGCxPqVybFq |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Balamurigan, A., |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Peng, Sheng-Lung, |
Relator term | editor. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Verma, O. P. |
Titles and other words associated with a name | (Telecommunications engineer), |
Relator term | editor. |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCjCkr7jQB3gWYmrdQh7MWC |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Design and analysis of security protocol for communication (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCGbrVrWTpTFjkWqFvb3RKd |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Title | Design and analysis of security protocol for communication. |
Edition | First edition. |
Place, publisher, and date of publication | Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [2020] |
International Standard Book Number | 9781119555643 |
Record control number | (DLC) 2019045372 |
-- | (OCoLC)1124779025 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH35581858 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH35581859 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL6040173 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 16322773 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.