SLIM21

Sort Order Display Format Items / Page  
 
  Click the serial number on the left to view the details of the item.
 #  AuthorTitleAccn#YearItem Type Claims
1 Richard R. Brooks Introduction to computer and network security: Navigating Shades of Gray 025955 2014 Book  
2 Alexander Stanoyevitch Introduction to cryptography: With Mathematical Functions and Computer Implementations 025888 2013 Book  
3 Serge Vaudenay Classical introduction to cryptography: Applications for communications security 022594 2006 Book  
4 Simon Singh Code book: The secret history of codes and codebreaking E00979 Book  
5 LOEPP, SUSAN Protecting information: From classical error correction to quantum crytography 021064 2006 Book  
6 Coutinho, S.C. Mathematics of ciphers: Number theory and RSA cryptography 018308 1999 Book  
7 Hans Delfs Introduction to cryptography : Principles and applications 018055 2002 Book  
8 M.R. Schroeder Number theory in science and communication With applicaitons\in cryptography, physics, digital information, computing, and self 016679 1997 Book  
9 Philip Zimmermann PGP source code and internals 012896 1995 Book  
10 Helen Fouche Gaines Cryptanalysis: A study of ciphers and their solution 004348 1956 Book  
(page:1 / 1) [#10]     

1.    
No image available
TitleIntroduction to computer and network security: Navigating Shades of Gray
Author(s)Richard R. Brooks
PublicationBoca Taton, CRC Press, 2014.
Descriptionxxiv, 205p.
Abstract NoteTaking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems.
ISBN,Price9781439860717 : UKP 49.99(HB)
Classification681.324
Keyword(s)1. COMPUTER NETWORK SECURITY 2. COMPUTER NETWORKS 3. CRYPTOGRAPHY 4. NETWORK SECURITY 5. POLYMORPHIC VIRUS 6. WEB SECURITY
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
025955   681.324/BRO/025955  On Shelf    

+Copy Specific Information
2.     
No image available
TitleIntroduction to cryptography: With Mathematical Functions and Computer Implementations
Author(s)Alexander Stanoyevitch
PublicationBoca Raton, CRC Press, 2013.
Descriptionxix, 649p.
Series(Descrete Mathematics and its Applications)
Abstract NoteBook provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.
ISBN,Price9781439817636 : Rs. 5495.00(HB)
Classification512:003.26
Keyword(s)1. CODING THEORY 2. CRYPTOGRAPHY 3. DATA ENCRYPTION
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
025888   512:003.26/STA/025888  On Shelf    

+Copy Specific Information
3.     
No image available
TitleClassical introduction to cryptography: Applications for communications security
Author(s)Serge Vaudenay
PublicationNew Delhi, Springer, 2006.
Descriptionxviii;335p.
ISBN,Price97881848919959 : Rs. 345.00(PB)
Classification003.26
Keyword(s)1. COMMUNICATION SECURITY 2. CRYPTOGRAPHY
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
022594   003.26/VAU/022594  On Shelf    

+Copy Specific Information
4.     
No image available
TitleCode book: The secret history of codes and codebreaking
Author(s)Simon Singh
PublicationLondon, Fourth Estate Limited,
Descriptionxiii, 402p.
ISBN,Price978000763574 : Rs. 295(PB)
Classification003.26
Keyword(s)1. CODE LANGUAGE 2. CRYPTOGRAPHY 3. M.V.S.
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
E00979   003.26/SIN/E00979  Issued IS018: Muktangan Vidnyan Shodhika, C/O Samir Dhurde 19/Jun/2011

+Copy Specific Information
5.     
No image available
TitleProtecting information: From classical error correction to quantum crytography
Author(s)Susan Loepp;William K. Wootters
PublicationCambridge, Cambridge University Press, 2006.
Description287p.
ISBN,Price9780521534765 : US $29.99
Classification003.26:511:530.145.6
Keyword(s)1. CODING 2. COMPUTER SECURITY 3. CRYPTOGRAPHY 4. DIGITAL INFORMATION 5. QUANTUM COMPUTERS 6. QUANTUM CRYPTOGRAPHY 7. QUANTUM MECHANICS
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
021064   003.26:511:530.145.6/LOE/021064  On Shelf    

+Copy Specific Information
6.     
No image available
TitleMathematics of ciphers: Number theory and RSA cryptography
Author(s)S.C. Coutinho
PublicationHyderabad, Universities Press, 1999.
Description196p.
ISBN,Price8173714428 : Rs. 185.00
Classification511
Keyword(s)1. CIPHERS 2. CRYPTOGRAPHY 3. NUMBER THEORY 4. PRIME NUMBERS 5. RIVEST SHAMIR AND ADLEMAN PUBLIC KEY CRYPTOSYSTEM 6. RSA CRYPTOGRAPHY
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
018308   511/COU/018308  On Shelf    

+Copy Specific Information
7.     
No image available
TitleIntroduction to cryptography : Principles and applications
Author(s)Hans Delfs;Helmut Knebl
PublicationBerlin, Springer-Verlag, 2002.
Description310p.
Series(Information Security and Cryptography Texts and Monographs)
ISBN,Price3540422781 : Euro 6.00
Classification512:003.26
Keyword(s)1. ALGEBRA 2. CRYPTOGRAPHIC PROTOCOL 3. CRYPTOGRAPHY 4. EBOOK 5. EBOOK - SPRINGER 6. NUMBER THEORY 7. PROBABILISTIC ALGORITHM 8. PROBLEMS - SOLUTIONS - CRYPTOGRAPHY 9. PUBLIC-KEY CRYPTOGRAPHY 10. SYMMETRIC-KEY ENCRYPTION
Item TypeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
018055   512:003.26/DEL/018055  On Shelf    
I12058   512:003.26/DEL/  On Shelf    

+Copy Specific Information
8.     
No image available
TitleNumber theory in science and communication With applicaitons\in cryptography, physics, digital information, computing, and self-similarity\
Author(s)M.R. Schroeder
Edition3rd ed.
PublicationBerlin, Springer-Verlag, 1997.
Descriptionxxii,363P.
Series(Springer series in information sciences)
ISBN,Price3540620060
Classification511
Keyword(s)1. CONGRUENCE 2. CRYPTOGRAPHY 3. CYCLOTOMY 4. DIFFRACTION 5. DIGITAL INFORMATION PROCESSING 6. FRACTALS 7. FRACTIONS 8. GALOIS FIELDS 9. MOBIUS TRANSFORM 10. NATURAL NUMBERS 11. NUMBER THEORY 12. POLYNOMIAL 13. PRIMES 14. RESIDUES
Item TypeBook
Multi-Media Links
Please Click Here for the Online Book
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
016679   511/SCH/016679  On Shelf    

+Copy Specific Information
9.     
No image available
TitlePGP source code and internals
Author(s)Philip Zimmermann
PublicationCambridge, MA, MIT Press, 1995.
DescriptionXXI,907P.
ISBN,Price0-262-24039-4
Classification681.324:003.26
Keyword(s)1. CRYPTOGRAPHY 2. INTERNET SECURITY 3. PGP
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
012896   681.324:003.26/ZIM/012896  On Shelf    

+Copy Specific Information
10.    
No image available
TitleCryptanalysis: A study of ciphers and their solution
Author(s)Helen Fouche Gaines
PublicationNew York, Dover Publications, Inc., 1956.
Description237pp.
Classification003.26
Keyword(s)1. CIPHERS 2. CRYPTANALYSIS 3. CRYPTOGRAPHY
Item TypeBook

Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
004348   003.26/GAI/004348  On Shelf    

+Copy Specific Information
(page:1 / 1) [#10]