NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Design and analysis of security protocol for communication / (Record no. 12685)

MARC details
000 -LEADER
fixed length control field 07160cam a2200769 i 4500
001 - CONTROL NUMBER
control field on1139536172
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125542.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200206s2020 nju ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency DG1
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency DG1
Modifying agency DG1
-- EBLCP
-- AU@
-- UKAHL
-- DG1
-- OCLCQ
-- YDX
-- UKMGB
-- S2H
-- UMI
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBC013545
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 019690871
Source Uk
019 ## -
-- 1141200499
-- 1222919934
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119555759
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119555752
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119555742
Qualifying information (ePub ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119555744
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119555766
Qualifying information (PDF ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119555760
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119555643
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119555647
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000066723584
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 001077492
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 582680409
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 019690871
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1139536172
Canceled/invalid control number (OCoLC)1141200499
-- (OCoLC)1222919934
037 ## - SOURCE OF ACQUISITION
Stock number 9781119555742
Source of stock number/acquisition Wiley
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .D468 2020eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 00 - TITLE STATEMENT
Title Design and analysis of security protocol for communication /
Statement of responsibility, etc. edited by Dinesh Goyal, A. Balamurigan, Sheng-Lung Peng and O.P. Verma.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Inc. ;
Place of production, publication, distribution, manufacture Salem, Massachusetts :
Name of producer, publisher, distributor, manufacturer Scrivener Publishing LLC,
Date of production, publication, distribution, manufacture, or copyright notice [2020]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any. The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"--
Assigning source Provided by publisher
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 History and Generations of Security Protocols -- 1.1 Introduction -- 1.2 Network Security -- 1.3 Historical Background of Network Security and Network Timeline -- 1.4 Internet Architecture and Security Aspects -- 1.4.1 IPv4 and IPv6 Architecture -- 1.4.1.1 Structure of IPv4 -- 1.4.1.2 IPv6 Architecture -- 1.4.2 Attack Through IPv4 -- 1.4.2.1 Internet Attacks Common Methods -- 1.4.2.2 Internet Security Technology -- 1.4.3 IPv6 IP Security Issues -- 1.5 Different Aspects of Security of the Network
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 1.6 Evolution of Security Protocols for Network -- 1.6.1 Understanding the Key Components of Network Security -- 1.6.2 A Deep Defense Strategy -- 1.6.3 How Does the Next Generation Network Security System Work Best -- 1.7 Network Security Protocols -- 1.7.1 Application Layer -- 1.7.1.1 Good Privacy (PGP) -- 1.7.1.2 Email/Multipurpose Security (S/MIME) -- 1.7.1.3 HTTP Secure (S-HTTP) -- 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer -- 1.7.1.5 Secure E-Commerce (SET) -- 1.7.1.6 Kerberos -- 1.7.2 Transport Layer -- 1.7.2.1 Secure Sockets Layer (SSL)
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 1.7.2.2 Transport Layer Security (TLS) -- 1.7.3 Network Layer -- 1.7.3.1 Internet Protocol Security (IPSec) -- 1.7.3.2 Virtual Private Network (VPN) -- 1.7.4 Data Link Layer -- 1.7.4.1 Point-to-Point Protocol (PPP) -- 1.7.4.2 Remote Authentication User Service (RADIO) -- 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) -- 1.8 Current Evolution of Red Security -- 1.8.1 Hardware Development -- 1.8.2 Software Development -- 1.9 Future Security Trends -- References -- Chapter 2 Evolution of Information Security Algorithms -- 2.1 Introduction to Conventional Encryption
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.2 Classical Encryption Techniques -- 2.2.1 Substitution Based -- 2.2.1.1 Caesar Cipher -- 2.2.1.2 Monoalphabetic Cipher -- 2.2.1.3 Playfair Cipher -- 2.2.1.4 Polyalphabetic Cipher -- 2.2.2 Transposition Based -- 2.2.2.1 Simple Columnar -- 2.2.2.2 Rail Fence Cipher -- 2.3 Evolutions of Modern Security Techniques -- 2.3.1 Stream Cipher Algorithms -- 2.3.1.1 One Time Pad (OTP) -- 2.3.1.2 RC-4 -- 2.3.1.3 A5/1 -- 2.3.2 Block Cipher Algorithms -- 2.3.2.1 Feistel Cipher Structure -- 2.3.2.2 Data Encryption Standard (DES) -- 2.3.2.3 Triple Data Encryption Standard (TDES)
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.3.2.4 International Data Encryption Algorithm (IDEA) -- 2.3.2.5 Blowfish -- 2.3.2.6 CAST-128 -- 2.4 Conclusion -- References -- Practice Set -- Review Questions and Exercises -- 3 Philosophy of Security by Cryptostakes Schemes -- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) -- 3.2 RSA Algorithm -- 3.3 Security Analysis of RSA -- 3.4 Exponentiation in Modular Arithmetic -- 3.5 Distribution of Public Keys -- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems -- 3.7 Discrete Logarithms -- 3.8 Diffie-Hellman Key Exchange -- 3.9 Review Exercise -- References
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer network protocols.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element R�eseaux d'ordinateurs
General subdivision S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Protocoles de r�eseaux d'ordinateurs.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer network protocols
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Goyal, Dinesh,
Dates associated with a name 1976-
Relator term editor.
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCjt9jX6w94WJGCxPqVybFq
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Balamurigan, A.,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Peng, Sheng-Lung,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Verma, O. P.
Titles and other words associated with a name (Telecommunications engineer),
Relator term editor.
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCjCkr7jQB3gWYmrdQh7MWC
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Design and analysis of security protocol for communication (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCGbrVrWTpTFjkWqFvb3RKd
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Design and analysis of security protocol for communication.
Edition First edition.
Place, publisher, and date of publication Hoboken, New Jersey : John Wiley & Sons, Inc. ; Salem, Massachusetts : Scrivener Publishing LLC, [2020]
International Standard Book Number 9781119555643
Record control number (DLC) 2019045372
-- (OCoLC)1124779025
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH35581858
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH35581859
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL6040173
938 ## -
-- YBP Library Services
-- YANK
-- 16322773
994 ## -
-- 92
-- INLUM

No items available.