Applied cryptography : (Record no. 753)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01345cam a2200241 a 4500 |
001 - CONTROL NUMBER | |
control field | 2021 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200708104930.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 950327s1996 nyua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788126513680 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | PK |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/2 |
Edition number | 20 |
Item number | S3598 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Schneier, Bruce, |
245 10 - TITLE STATEMENT | |
Title | Applied cryptography : |
Remainder of title | protocols, algorithms, and source code in C / |
Statement of responsibility, etc | Bruce Schneier. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New Delhi : |
Name of publisher, distributor, etc | Wiley, |
Date of publication, distribution, etc | 2007 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiii, 758 p. |
Other physical details | ill. ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | Includes bibliographical references (p. 675-741) and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Telecommunication |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1. Partial table of contents:<br/>2. Cryptographic protocols.<br/>3. Protocol building blocks.<br/>4. Basic protocols.<br/>5. Intermediate protocols.<br/>6. Advanced protocols.<br/>7. Esoteric protocols.<br/>8. Cryptographic techniques.<br/>9. Key length.<br/>10. Key management.<br/>11. Algorithm types and modes.<br/>12. Using algorithms.<br/>13. Cryptographic algorithms.<br/>14. Data encryption standard (des).<br/>15. Other block ciphers.<br/>16. Other stream ciphers and real random-sequence generators.<br/>17. Public-key algorithms.<br/>18. Special algorithms for protocols.<br/>19. The real world.<br/>20. Example implementations.<br/>21. Politics.<br/>22. Source code.source code.<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 20.06.2018 | U.E. | 005.82 S3598 | T2021 | 20.06.2018 | 20.06.2018 | Books |