Disappearing cryptography (Record no. 75)

000 -LEADER
fixed length control field 04815cam a2200553Ia 4500
001 - CONTROL NUMBER
control field ocn413010270
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140426153706.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090625s2009 ne a ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OPELS
Language of cataloging eng
Transcribing agency OPELS
Modifying agency N$T
-- OPELS
-- OCLCQ
-- YDXCP
-- EBLCP
-- IDEBK
-- OCLCQ
-- E7B
-- AU@
-- B24X7
-- STF
-- OCLCQ
-- VLB
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Canceled or invalid record control number 014776934
Source Uk
019 ## -
-- 609818151
-- 647821640
-- 684550187
-- 758072177
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780080922706 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0080922708 (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780123744791 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0123744792 (alk. paper)
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000046275691
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)413010270
Canceled/invalid control number (OCoLC)609818151
-- (OCoLC)647821640
-- (OCoLC)684550187
-- (OCoLC)758072177
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .W39 2009eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 22
049 ## - LOCAL HOLDINGS (OCLC)
Holding library NTRA
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wayner, Peter,
Dates associated with a name 1964-
245 10 - TITLE STATEMENT
Title Disappearing cryptography
Medium [electronic resource] :
Remainder of title information hiding : steganography & watermarking /
Statement of responsibility, etc Peter Wayner.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam ;
-- Boston :
Name of publisher, distributor, etc Morgan Kaufmann Publishers,
Date of publication, distribution, etc 2009.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xv, 439 p.) :
Other physical details ill.
520 ## - SUMMARY, ETC.
Summary, etc Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 403-430) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Framing information -- Encryption -- Error correction -- Secret sharing -- Compression -- Basic mimicry -- Grammars and mimicry -- Turing and reverse -- Life in the noise -- Anonymous remailers -- Secret broadcasts -- Keys -- Ordering and reordering -- Spreading -- Synthetic worlds -- Watermarks -- Steganalysis -- Obfuscation -- Synchronization -- Translucent databases -- Plain sight -- Coda.
588 ## -
-- Description based on print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures. Cryptography. Internet.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- Cryptography.
Source of heading or term bisacsh
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Wayner, Peter, 1964-
Title Disappearing cryptography.
Edition 3rd ed.
Place, publisher, and date of publication Amsterdam ; Boston : Morgan Kaufmann Publishers, c2009
International Standard Book Number 9780123744791
Record control number (DLC) 2008044800
-- (OCoLC)262718639
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified ScienceDirect
Uniform Resource Identifier http://www.sciencedirect.com/science/book/9780123744791
938 ## -
-- YBP Library Services
-- YANK
-- 3057014
938 ## -
-- EBL - Ebook Library
-- EBLB
-- EBL453174
938 ## -
-- ebrary
-- EBRY
-- ebr10310711
938 ## -
-- Books 24x7
-- B247
-- bks00037207
938 ## -
-- EBSCOhost
-- EBSC
-- 249005
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
994 ## -
-- 92
-- NITR

No items available.


Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha