Core concepts in computer science: (Record no. 28255)

MARC details
000 -LEADER
fixed length control field 01390nam a22003017a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240802094727.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231021b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781984620705
040 ## - CATALOGING SOURCE
Original cataloging agency TUPM
Language of cataloging eng
Transcribing agency TUP-M
Modifying agency -
Description conventions rda
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA
Item number 76.9.A25 T47 2019
110 ## - MAIN ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element 3G E-Learning
245 ## - TITLE STATEMENT
Title Core concepts in computer science:
Remainder of title cryptography /
Statement of responsibility, etc. authored and edited by 3G E-Learning LLC.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York, NY :
Name of publisher, distributor, etc. 3G E-Learning LLC.
Date of publication, distribution, etc. 2019
300 ## - PHYSICAL DESCRIPTION
Extent 248 pages :
Other physical details color illustrations;
Dimensions 23 cm +
Accompanying material 1 DVD ; 4 3/4 in.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 Introduction to cryptography 1 -- Chapter 2 Encryption and decryption 31 -- Chapter 3 Symmetric key encryption 83 -- Chapter 4 Public key encyption 113 -- Chapter 5 IP security 161 -- Chapter 6 Network security 201
520 ## - SUMMARY, ETC.
Summary, etc. This book discusses some of the critical security challenges faced by todays computing world and provides insights to possible mechanisms to defend against these attacks.--Book
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Book
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Library of Congress Classification     TUP Manila Library TUP Manila Library General Circulation Section-GF 01/24/2022 Fastbook 4000.00 33657   QA 76.9.A25 T47 2019 P00033657 10/21/2023 4000.00 01/24/2022 Book



© 2025 Technological University of the Philippines.
All Rights Reserved.

Powered by Koha