Fundamentals of computer security:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2003
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XX, 677 S. : graph. Darst. |
ISBN: | 3540431012 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV014283856 | ||
003 | DE-604 | ||
005 | 20050120 | ||
007 | t | ||
008 | 020506s2003 gw d||| |||| 00||| eng d | ||
016 | 7 | |a 964453185 |2 DE-101 | |
020 | |a 3540431012 |9 3-540-43101-2 | ||
035 | |a (OCoLC)248032967 | ||
035 | |a (DE-599)BVBBV014283856 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-20 |a DE-739 |a DE-573 |a DE-29T |a DE-91G |a DE-521 |a DE-522 |a DE-634 |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25P536 2003 | |
082 | 0 | |a 005.8 21 | |
082 | 0 | |a 005.8 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a 28 |2 sdnb | ||
084 | |a 17 |2 sdnb | ||
100 | 1 | |a Pieprzyk, Josef |d 1949- |e Verfasser |0 (DE-588)122464095 |4 aut | |
245 | 1 | 0 | |a Fundamentals of computer security |c Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2003 | |
300 | |a XX, 677 S. |b : graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computersicherheit - Lehrbuch | |
650 | 4 | |a Kryptologie - Lehrbuch | |
650 | 4 | |a Kryptosystem | |
650 | 4 | |a Rechnernetz - Computersicherheit | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Hardjono, Thomas |e Verfasser |4 aut | |
700 | 1 | |a Seberry, Jennifer |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009795676 |
Datensatz im Suchindex
_version_ | 1804129175342153728 |
---|---|
adam_text | Table
1
1.1
1.2
1.3
1.4
2
2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.2
2.2.1
2.2.2
2.2.3
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.3.9
2.3.10
2.4 Elements
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.5
Private-Key Cryptosystems
3.1
3.1.1
3.1.2 Affine
3.1.3
3.1.4
3.1.5 Homophonie
3.1.6
3.1.7
3.2 DES
3.2.1
3.2.2
3.2.3 DES
3.2.4 DES
3.2.5
3.3
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.4
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
3.5
3.5.1
3.5.2
3.5.3
3.6
3.6.1
3.6.2
3.6.3
3.6.4
3.6.5
3.6.6
3.7
Public-Key Cryptosystems
4.1
4.2
4.2.1
4.2.2
4.2.3
4.2.4
4.3
4.3.1
4.4
4.4.1
4.5
4.5.1
4.6
4.6.1
4.6.2
4.6.3
4.6.4
4.7
4.7.1
4.7.2
4.8
4.8.1
4.8.2
4.8.3
4.8.4
4.9
Pseudorandomness
5.1
5.2
5.3
5.3.1
5.3.2
5.4
5.5
5.6
5.7
5.8
Hashing
6.1
6.2
6.3
6.4
6.5
6.6
6.6.1
6.6.2
6.6.3
6.6.4
6.6.5
6.7
6.7.1
6.7.2
6.8
7
7.1
7.2
7.2.1
7.2.2
7.2.3
7.3
7.4
7.5
7.6
7.7
7.8
7.9
8
8.1
8.2
8.2.1
8.2.2
8.2.3
8.2.4
8.3
8.4
8.4.1
8.4.2
8.4.3
8.5
8.6
9
9.1
9.1.1
9.1.2
9.1.3
9.1.4
9.2
9.2.1
9.2.2
9.3
9.4
9.4.1
9.4.2
9.4.3
9.5
9.6
10
10.1
10.1.1
10.1.2
10.1.3
10.1.4
10.2
10.2.1
10.2.2
10.2.3
10.3
10.3.1
10.3.2
10.3.3
10.4
11
11.1
11.2
11.2.1
11.3
11.3.1 Kerberos......................................... 387
11.3.2
11.3.3
11.4
11.4.1
11.4.2
11.4.3
11.4.4
11.5
11.6
11.6.1
11.6.2
11.7
12
12.1
12.2
12.3
12.4
12.4.1
12.4.2
12.4.3
12.5
13
13.1
13.2
13.3
13.3.1
13.3.2
13.4
13.4.1
13.4.2
13.5
13.5.1
13.5.2
13.5.3
13.6
13.6.1 Schnorr
13.6.2
13.6.3
13.7 Problems
14
14.1
14.2
14.2.1
14.2.2
14.2.3
14.3
14.4
14.4.1
14.4.2
14.5
14.6
14.6.1
14.6.2
14.6.3
14.7
14.7.1
14.7.2
14.7.3
14.7.4
14.8
14.8.1
14.8.2
14.9
14.10
14.11
15
15.1
15.1.1
15.1.2
15.1.3
15.1.4
15.1.5
15.2
15.2.1
15.2.2
15.2.3
15.2.4
15.2.5
15.3
16
16.1
16.2
16.3
16.3.1
16.4
16.4.1
16.5
16.5.1
16.5.2
16.5.3
16.6
16.7
16.8
16.9
16.9.1
16.9.2
16.9.3
17
17.1
17.1.1
17.1.2
17.2
17.2.1
17.2.2
17.3
17.4
17.4.1
17.4.2
17.4.3
17.4.4
17.4.5
18
18.1
18.1.1
18.1.2
18.1.3
18.1.4
18.1.5
18.2
18.2.1
18.2.2
18.2.3
18.2.4
18.2.5
18.2.6
18.3
18.3.1
18.3.2
18.3.3
18.3.4
18.3.5
18.3.6
18.3.7
18.3.8
References
Index
|
any_adam_object | 1 |
author | Pieprzyk, Josef 1949- Hardjono, Thomas Seberry, Jennifer |
author_GND | (DE-588)122464095 |
author_facet | Pieprzyk, Josef 1949- Hardjono, Thomas Seberry, Jennifer |
author_role | aut aut aut |
author_sort | Pieprzyk, Josef 1949- |
author_variant | j p jp t h th j s js |
building | Verbundindex |
bvnumber | BV014283856 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25P536 2003 |
callnumber-search | QA76.9.A25P536 2003 |
callnumber-sort | QA 276.9 A25 P536 42003 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 ST 276 ST 277 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)248032967 (DE-599)BVBBV014283856 |
dewey-full | 005.821 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 21 005.8 |
dewey-search | 005.8 21 005.8 |
dewey-sort | 15.8 221 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02389nam a2200649 c 4500</leader><controlfield tag="001">BV014283856</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20050120 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020506s2003 gw d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">964453185</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540431012</subfield><subfield code="9">3-540-43101-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248032967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014283856</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25P536 2003</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 21</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">17</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pieprzyk, Josef</subfield><subfield code="d">1949-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122464095</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals of computer security</subfield><subfield code="c">Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 677 S.</subfield><subfield code="b">: graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit - Lehrbuch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie - Lehrbuch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptosystem</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Computersicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hardjono, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seberry, Jennifer</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009795676</subfield></datafield></record></collection> |
id | DE-604.BV014283856 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:00:57Z |
institution | BVB |
isbn | 3540431012 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009795676 |
oclc_num | 248032967 |
open_access_boolean | |
owner | DE-20 DE-739 DE-573 DE-29T DE-91G DE-BY-TUM DE-521 DE-522 DE-634 DE-83 DE-11 |
owner_facet | DE-20 DE-739 DE-573 DE-29T DE-91G DE-BY-TUM DE-521 DE-522 DE-634 DE-83 DE-11 |
physical | XX, 677 S. : graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer |
record_format | marc |
spelling | Pieprzyk, Josef 1949- Verfasser (DE-588)122464095 aut Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry Berlin [u.a.] Springer 2003 XX, 677 S. : graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computersicherheit - Lehrbuch Kryptologie - Lehrbuch Kryptosystem Rechnernetz - Computersicherheit Computer security Cryptography Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s Rechnernetz (DE-588)4070085-9 s Hardjono, Thomas Verfasser aut Seberry, Jennifer Verfasser aut Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Pieprzyk, Josef 1949- Hardjono, Thomas Seberry, Jennifer Fundamentals of computer security Computersicherheit - Lehrbuch Kryptologie - Lehrbuch Kryptosystem Rechnernetz - Computersicherheit Computer security Cryptography Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4033329-2 |
title | Fundamentals of computer security |
title_auth | Fundamentals of computer security |
title_exact_search | Fundamentals of computer security |
title_full | Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
title_fullStr | Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
title_full_unstemmed | Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
title_short | Fundamentals of computer security |
title_sort | fundamentals of computer security |
topic | Computersicherheit - Lehrbuch Kryptologie - Lehrbuch Kryptosystem Rechnernetz - Computersicherheit Computer security Cryptography Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computersicherheit - Lehrbuch Kryptologie - Lehrbuch Kryptosystem Rechnernetz - Computersicherheit Computer security Cryptography Computersicherheit Rechnernetz Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pieprzykjosef fundamentalsofcomputersecurity AT hardjonothomas fundamentalsofcomputersecurity AT seberryjennifer fundamentalsofcomputersecurity |