000 | 05152cam a2200949 a 4500 | ||
---|---|---|---|
001 | ocn123761153 | ||
003 | OCoLC | ||
005 | 20240523125529.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070427s2007 njua ob 001 0 eng d | ||
040 |
_aN$T _beng _epn _cN$T _dOCLCQ _dEBLCP _dTEFOD _dIDEBK _dE7B _dOCLCQ _dMHW _dOCLCQ _dREDDC _dOCLCQ _dDG1 _dYDXCP _dUMI _dDEBSZ _dOCLCQ _dMUX _dBTCTA _dNRU _dUKDOC _dOCLCF _dNLE _dTEFOD _dOCLCQ _dCOO _dOCLCQ _dDG1 _dIAS _dOCLCQ _dJBG _dAGLDB _dDG1 _dOCLCQ _dLIP _dOCLCA _dOCLCQ _dMERUC _dOCLCQ _dOCLCA _dOCLCQ _dVTS _dCEF _dOCLCQ _dWYU _dU3W _dUAB _dOCLCQ _dM8D _dVT2 _dOCLCQ _dK6U _dOCLCQ _dOCLCO _dUKBTH _dVLY _dOCLCO _dOCLCQ _dOCLCO _dSFB _dOCLCQ _dOCLCO _dOCLCL |
||
015 |
_aGBA697026 _2bnb |
||
016 | 7 |
_z013602570 _2Uk |
|
019 |
_a93923648 _a137284959 _a181820970 _a213166778 _a646800149 _a744981785 _a814479371 _a824561066 _a852491264 _a859882388 _a1065855908 _a1103252385 _a1129356810 _a1153016353 _a1159615877 |
||
020 |
_a9780470083970 _q(electronic bk.) |
||
020 |
_a0470083972 _q(electronic bk.) |
||
020 | _a9780470083987 | ||
020 | _a0470083980 | ||
020 | _z0471947830 | ||
020 | _z9780471947837 | ||
024 | 7 |
_a10.1002/0470083980 _2doi |
|
024 | 8 | _a9780471947837 | |
029 | 1 |
_aAU@ _b000043129408 |
|
029 | 1 |
_aAU@ _b000051357147 |
|
029 | 1 |
_aAU@ _b000052006543 |
|
029 | 1 |
_aAU@ _b000060471647 |
|
029 | 1 |
_aAU@ _b000061130219 |
|
029 | 1 |
_aCHNEW _b000929690 |
|
029 | 1 |
_aCHVBK _b480100306 |
|
029 | 1 |
_aDEBBG _bBV041431365 |
|
029 | 1 |
_aDEBBG _bBV043090009 |
|
029 | 1 |
_aDEBSZ _b39827214X |
|
029 | 1 |
_aDEBSZ _b400434466 |
|
029 | 1 |
_aDEBSZ _b422215082 |
|
029 | 1 |
_aDEBSZ _b430379536 |
|
029 | 1 |
_aNZ1 _b11571105 |
|
035 |
_a(OCoLC)123761153 _z(OCoLC)93923648 _z(OCoLC)137284959 _z(OCoLC)181820970 _z(OCoLC)213166778 _z(OCoLC)646800149 _z(OCoLC)744981785 _z(OCoLC)814479371 _z(OCoLC)824561066 _z(OCoLC)852491264 _z(OCoLC)859882388 _z(OCoLC)1065855908 _z(OCoLC)1103252385 _z(OCoLC)1129356810 _z(OCoLC)1153016353 _z(OCoLC)1159615877 |
||
037 |
_a24307C36-99BB-4A76-9317-7D1A7CC786FB _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
050 | 4 |
_aQA76.9.A25 _bK638 2007eb |
|
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _222 |
049 | _aMAIN | ||
100 | 1 |
_aKonheim, Alan G., _d1934- |
|
245 | 1 | 0 |
_aComputer security and cryptography / _cAlan G. Konheim. |
260 |
_aHoboken, N.J. : _bWiley-Interscience, _c�2007. |
||
300 |
_a1 online resource (xvii, 521 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 | _atext file | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aCOMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION. | |
520 | _aGain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. | ||
588 | 0 | _aPrint version record. | |
542 |
_fCopyright � Wiley-Interscience _g2007 |
||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aComputer security. | |
650 | 0 | _aCryptography. | |
650 | 2 | _aComputer Security | |
650 | 6 | _aS�ecurit�e informatique. | |
650 | 6 | _aCryptographie. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aCryptography _2fast |
|
758 |
_ihas work: _aComputer security and cryptography (Text) _1https://id.oclc.org/worldcat/entity/E39PCG8qWrQc6VycwbDWvcFGBP _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aKonheim, Alan G., 1934- _tComputer security and cryptography. _dHoboken, N.J. : Wiley-Interscience, �2007 _z0471947830 _z9780471947837 _w(DLC) 2006049338 _w(OCoLC)70408063 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/0470083980 |
938 |
_a123Library _b123L _n11828 |
||
938 |
_aBaker and Taylor _bBTCP _nBK0008118685 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL288170 |
||
938 |
_aebrary _bEBRY _nebr10278852 |
||
938 |
_aEBSCOhost _bEBSC _n188322 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _n82189 |
||
938 |
_aYBP Library Services _bYANK _n2553751 |
||
938 |
_aYBP Library Services _bYANK _n2939202 |
||
994 |
_a92 _bINLUM |
||
999 |
_c11157 _d11157 |