000 -LEADER |
fixed length control field |
02147nam a22002897a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250811112557.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240503b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781666869453 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8/2 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Wilkins, Thomas, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Introduction to modern cryptography and network security / |
Statement of responsibility, etc |
Thomas Wilkins. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Wilmington, USA : |
Name of publisher, distributor, etc |
American Academic Publisher, |
Date of publication, distribution, etc |
[2024]. |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
© 2024. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiii, 351 pages ; |
Dimensions |
26 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Thomas Wilkins is a computer scientist with a Ph.D. He made a significant contribution to comprehending the broad range of technological breakthroughs in computer networking and architecture. Cryptography and network security, intrusion prevention, innovative computer architectures, and the application of information technology for social advantages (including low-cost protocols for web-based electronics) are among his research interest. He teaches undergraduate and postgraduate students in Computer Engineering courses on Computer Networks, Information Security and Applications, and Public Key Infrastructure. He has advised state agencies, computer and software companies, and major users on the design, selection, and usage of networking software and devices in his capacity as a consultant. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - CONTENTS |
Formatted contents note |
Chapter 1. Introduction -- Chapter 2. Fundamentals of cryptography -- Chapter 3. Cryptography and security -- Chapter 4. Computer security in information technology -- Chapter 5. Definitions of network secure device -- Chapter 6. Mobility and network security -- Chapter 7. Networking and security issues -- Chapter 8. Wireless network communication and security -- Chapter 9. Risk management: the game of network security -- Chapter 10. Software and design and security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
BOOK |
Issues (borrowed), all copies |
2 |