Pro Cryptography and Cryptanalysis (Record no. 367761)

MARC details
000 -LEADER
fixed length control field 01850 a2200193 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250927140650.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250912b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484277249
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Mihailescu M Nita S
9 (RLIN) 213039
245 ## - TITLE STATEMENT
Title Pro Cryptography and Cryptanalysis
Medium Creating Advanced Algorithms with C# and .NET
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc. Apress
Date of publication, distribution, etc. 2021
Place of publication, distribution, etc. Bucharest Romania
300 ## - PHYSICAL DESCRIPTION
Extent 556pp.
520 ## - SUMMARY, ETC.
Summary, etc. Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. <br/><br/>The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.<br/><br/>The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. <br/><br/>
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithms
9 (RLIN) 213361
650 20 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Mathematics and Numerical Analysis
9 (RLIN) 213362
650 30 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science
9 (RLIN) 213363
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Vendor Cost, normal purchase price Total Checkouts Barcode Date last seen Cost, replacement price Bill Date Koha item type Original Barcode
    Dewey Decimal Classification     MCA MKSSS s K.B. Joshi Institute of Information Technology Library MKSSS s K.B. Joshi Institute of Information Technology Library 11/09/2025 87 1949.25   KBJP-BK-2820 11/09/2025 2599.00 11/09/2025 Books 2820