Welcome to UE Central Library

Keep Smiling

Applied cryptography : (Record no. 753)

MARC details
000 -LEADER
fixed length control field 01345cam a2200241 a 4500
001 - CONTROL NUMBER
control field 2021
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200708104930.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 950327s1996 nyua b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788126513680
040 ## - CATALOGING SOURCE
Transcribing agency PK
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 20
Item number S3598
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schneier, Bruce,
245 10 - TITLE STATEMENT
Title Applied cryptography :
Remainder of title protocols, algorithms, and source code in C /
Statement of responsibility, etc Bruce Schneier.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc 2007
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 758 p.
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes bibliographical references (p. 675-741) and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Partial table of contents:<br/>2. Cryptographic protocols.<br/>3. Protocol building blocks.<br/>4. Basic protocols.<br/>5. Intermediate protocols.<br/>6. Advanced protocols.<br/>7. Esoteric protocols.<br/>8. Cryptographic techniques.<br/>9. Key length.<br/>10. Key management.<br/>11. Algorithm types and modes.<br/>12. Using algorithms.<br/>13. Cryptographic algorithms.<br/>14. Data encryption standard (des).<br/>15. Other block ciphers.<br/>16. Other stream ciphers and real random-sequence generators.<br/>17. Public-key algorithms.<br/>18. Special algorithms for protocols.<br/>19. The real world.<br/>20. Example implementations.<br/>21. Politics.<br/>22. Source code.source code.<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 20.06.2018 U.E. 005.82 S3598 T2021 20.06.2018 20.06.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk