000 05639cam a2200901 a 4500
001 ocn806039884
003 OCoLC
005 20240523125535.0
006 m o d
007 cr cnu---unuuu
008 120814s2010 inua ob 001 0 engod
040 _aN$T
_beng
_epn
_cN$T
_dYDXCP
_dE7B
_dEBLCP
_dOCLCQ
_dOCLCF
_dDEBSZ
_dOCLCQ
_dTEFOD
_dZCU
_dOCLCQ
_dTEFOD
_dDG1
_dOCLCQ
_dDEBBG
_dYDX
_dOCLCO
_dDG1
_dLIP
_dOCLCA
_dOCLCQ
_dOCLCA
_dKIJ
_dOCLCQ
_dCEF
_dOCLCA
_dYOU
_dUAB
_dU3W
_dK6U
_dOCLCO
_dOCLCQ
_dD6H
_dCOO
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCO
_dUKAHL
_dOCLCQ
_dOCLCO
_dAAA
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a965422899
_a992927351
_a1096428380
_a1100624716
_a1164344144
020 _a9781118722367
_q(electronic bk.)
020 _a1118722361
_q(electronic bk.)
020 _a9781118502822
_q(electronic bk.)
020 _a1118502825
_q(electronic bk.)
020 _a9781118080917
_q(electronic bk.)
020 _a1118080912
_q(electronic bk.)
020 _z9780470474242
020 _z0470474246
029 1 _aAU@
_b000055824751
029 1 _aCHNEW
_b000619895
029 1 _aCHNEW
_b000940510
029 1 _aCHVBK
_b480208107
029 1 _aDEBBG
_bBV040887842
029 1 _aDEBBG
_bBV043394974
029 1 _aDEBSZ
_b396952798
029 1 _aDEBSZ
_b485026104
029 1 _aNZ1
_b14807271
035 _a(OCoLC)806039884
_z(OCoLC)965422899
_z(OCoLC)992927351
_z(OCoLC)1096428380
_z(OCoLC)1100624716
_z(OCoLC)1164344144
037 _aD7FC186E-2725-4ABA-912F-A06CDC981A1F
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aQA76.9.A25
_bF466 2010eb
072 7 _aCOM
_x083000
_2bisacsh
082 0 4 _a005.8/2
_222
084 _aST 276
_2rvk
084 _aDAT 465f
_2stub
049 _aMAIN
100 1 _aKohno, Tadayoshi.
245 1 0 _aCryptography engineering :
_bdesign principles and practical applications /
_cTadayoshi Kohno, Niels Ferguson, Bruce Schneier.
260 _aIndianapolis, IN :
_bWiley Pub., Inc.,
_c�2010.
300 _a1 online resource (xxix, 353 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 8 _aCryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start.
505 0 _aIntroduction. The Context of Cryptography / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Introduction to Cryptography / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Message Security. Block Ciphers / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Block Cipher Modes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Hash Functions / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Message Authentication Codes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- The Secure Channel / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Implementation Issues (I) / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Negotiation. Generating Randomness / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Primes / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Diffie-Hellman / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- RSA / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Introduction to Cryptographic Protocols / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Negotiation / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Implementation Issues (II) / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Management. The Clock / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Key Servers / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- The Dream of PKI / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- PKI Reality / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- PKI Practicalities / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Storing Secrets / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Miscellaneous. Standards and Patents / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno -- Involving Experts / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno.
588 0 _aPrint version record.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aCryptography.
650 0 _aComputer security.
650 2 _aComputer Security
650 6 _aCryptographie.
650 6 _aS�ecurit�e informatique.
650 7 _aCOMPUTERS
_xSecurity
_xCryptography.
_2bisacsh
650 7 _aComputer security
_2fast
650 7 _aCryptography
_2fast
650 7 _aComputersicherheit
_2gnd
650 7 _aKryptologie
_2gnd
650 7 _aKryptologie
_xMethoden und Technik.
_2idsbb
650 7 _aKryptologi.
_2sao
650 7 _aKryptering.
_2sao
650 7 _aIT-s�akerhet.
_2sao
700 1 _aFerguson, Niels.
700 1 _aSchneier, Bruce,
_d1963-
_1https://id.oclc.org/worldcat/entity/E39PBJrKYhDmywQTtHTwP7y68C
776 0 8 _iPrint version:
_aKohno, Tadayoshi.
_tCryptography engineering.
_dIndianapolis, IN : Wiley Pub., inc., �2010
_z9780470474242
_w(DLC) 2010920648
_w(OCoLC)436030574
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367
938 _aAskews and Holts Library Services
_bASKH
_nAH21623052
938 _aAskews and Holts Library Services
_bASKH
_nBDZ0020917853
938 _aProQuest Ebook Central
_bEBLB
_nEBL661548
938 _aebrary
_bEBRY
_nebr10587576
938 _aEBSCOhost
_bEBSC
_n474779
938 _aYBP Library Services
_bYANK
_n9564718
938 _aYBP Library Services
_bYANK
_n12647634
938 _aYBP Library Services
_bYANK
_n12670109
994 _a92
_bINLUM
999 _c11811
_d11811