Network security: private communication in a public world
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ
Prentice Hall
2002
|
Ausgabe: | 2. ed. |
Schriftenreihe: | Prentice Hall series in computer networking and distributed systems
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | XXVI, 713 S. Ill. |
ISBN: | 0130460192 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV014328118 | ||
003 | DE-604 | ||
005 | 20131108 | ||
007 | t | ||
008 | 020604s2002 a||| |||| 00||| eng d | ||
020 | |a 0130460192 |9 0-13-046019-2 | ||
035 | |a (OCoLC)248251061 | ||
035 | |a (DE-599)BVBBV014328118 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-92 |a DE-91G |a DE-703 |a DE-522 |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 256f |2 stub | ||
100 | 1 | |a Kaufman, Charlie |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network security |b private communication in a public world |c Charlie Kaufman ; Radia Perlman ; Mike Speciner |
250 | |a 2. ed. | ||
264 | 1 | |a Upper Saddle River, NJ |b Prentice Hall |c 2002 | |
300 | |a XXVI, 713 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Prentice Hall series in computer networking and distributed systems | |
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Electronic data processing departments |x Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mailbox |0 (DE-588)4114492-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Mailbox |0 (DE-588)4114492-2 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
689 | 4 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 4 | |8 4\p |5 DE-604 | |
700 | 1 | |a Perlman, Radia |e Verfasser |4 aut | |
700 | 1 | |a Speciner, Mike |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009829167&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009829167 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804129226004103168 |
---|---|
adam_text | Contents
Acknowledgments
CHAPTER
1.1
1.2
1.3
1.4
1.5
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
1.5.8
1.6
1.7
1.8
1.9
1.10
1.11
1.12
1.12.1
1.12.2
1.12.3
1.12.4
1.12.5
1.13
1.13.1
1.13.2
1.13.3
1.13.4
1.13.5
1.13.6
vii
viii
1.14
1.14.1
1.14.2
CRYPTOGRAPHY
CHAPTER
2.1
2.1.1
2.1.2
2.1.3
2.2
2.2.1
2.2.2
2.2.3
2.3
2.4
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.5
2.5.1
2.5.2
2.5.3
2.5.4
2.5.5
2.6
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.7
CHAPTER
3.1
3.2
3.3
3.3.1
3.3.2
3.3.3
Contents
3.3.4
3.3.5
3.3.6
3.3.7
3.4
3.4.1
3.4.2
3.4.3
3.4.3.1
3.4.3.2
3.4.4
3.4.5
3.5
3.5.1
3.5.2
3.5.2.1
3.5.3
3.5.4
3.5.5
3.5.6
3.6
3.7
CHAPTER
4.1
4.2
4.2.1 -
4.2.2
4.2.2.1
4.2.2.2
4.2.3
4.2.4
4.2.5
4.3
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5
4.4
4.4.1
4.4.1.1
x
4.4.1.2
4.4.1.3
4.4.2
4.5
CHAPTER
5.1
5.2
5.2.1
5.2.2
5.2.3
5.2.3.1
5.2.3.2
5.2.4
5.2.4.1
5.2.4.2
5.3
5.3.1
5.3.2
5.3.3
5.4
5.4.1
5.4.2
5.4.3
5.4.4
5.4.5
5.5
5.5.1
5.5.2
5.5.3
5.5.4
5.5.5
5.5.6
5.6
5.6.1
5.6.2
5.6.3
5.7
5.8
CHAPTER
6.1
Contents
6.2
6.2.1
6.2.2
6.2.3
6.3
6.3.1
6.3.2
6.3.3
6.3.4
6.3.4.1
6.3.4.2
Finding Big Primes
Finding
6.3.4.3
6.3.4.4
6.3.5
6.3.5.1
6.3.5.2
6.3.6
6.3.6.1
6.3.6.2
6.3.6.3
6.4
6.4.1
6.4.2
л
6.4.2.2
6.4.3
6.4.4
6.4.5
6.5
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.6
6.7
6.8
6.8.1
6.9
xii
CHAPTER
7.1
7.2
7.3
7.4
7.4.1
7.5
7.6
7.7
7.8
7.8.1
7.9
CHAPTER
8.1
8.2
8.3
8.4
8.4.1
8.4.2
8.4.2.1
8.4.2.2
8.5
8.5.1
8.6
8.7
AUTHENTICATION
CHAPTER
9.1
9.1.1
9.1.2
9.2
9.2.1
9.3
9.4
9.5
9.6
9.7
9.7.1
9.7.2
Contents
9.7.3
9.7.4
9.7.4.1
9.7.4.2
9.8
9.9
9.10
CHAPTER
10.1
10.2
10.3
10.4
10.5
10.6
10.6.1
10.6.2
10.6.3
10.6.4
10.7
10.8
10.9
10.10
10.11
CHAPTER
11.1
11.1.1
11.1.2
11.2
11.2.1
11.2.2
11.2.3
11.2.4
11.3
11.3.1
11.3.2
11.3.3
11.3.4
11.4
11.4.1
11.4.2
xiv
11.4.3 Otway-Rees..............................................................................................278
11.5
11.6
11.7
11.8
11.9
CHAPTERS Strong Password Protocols
12.1
12.2
12.3
12.3.1
12.3.2
12.3.3
12.3.4
12.4
12.5
STANDARDS
CHAPTER
13.1
13.2
13.3
13.4
13.4.1
13.4.2
13.5
13.6
13.7
13.8
13.9
13.10
13.11
13.12
13.12.1
13.12.2
13.12.3
13.12.4
13.12.5
13.12.6
13.12.7
13.12.8
Contents
13.12.9
13.12.10
13.12.11
13.12.12
13.13
CHAPTER
14.1
14.2
14.3
14.4
14.4.1
14.4.2
14.5
14.6
14.7
14.8
14.8.1
14.8.1.1
14.8.1.2
14.8.1.3
14.8.1.4
14.8.1.5
14.8.2
14.9
14.10
14.11
14.12
14.13
14.14
14.15 Kerberos V5
14.15.1
14.15.2
14.15.3
14.15.4
14.15.5
14.15.6
14.15.7
14.15.8
14.15.9
14.15.10
14.15.11
xvi
14.15.12
14.16
CHAPTER
15.1
15.2
15.3
15.3.1
15.3.2
15.3.3
15.3.4
15.3.5
15.3.6
15.3.7
15.3.8
15.3.9
15.3.10
15.3.11
15.4
15.4.1
15.4.1.1
15.4.1.2
15.4.2
15.4.3
15.5
15.5.1
15.5.2
15.6
15.6.1
15.6.2
15.6.3
15.7
15.7.1
15.8
15.8.1
15.8.2
15.8.3
15.8.3.1
15.8.4
15.8.5
15.9
Contents
CHAPTER
16.1
16.2
16.3
16.4
16.5
16.5.1
16.5.2
16.6 Endpoint
16.7
16.8
16.9
16.10
16.11
16.12
16.13
16.14
CHAPTER
17.1
17.1.1
17.1.2
17.1.3
17.1.4
17.1.5
17.1.6
17.2
17.2.1
17.2.2
17.2.3 IPv4
17.2.4 IPv6
17.3
17.3.1
17.3.2
17.4
17.5
17.6
17.7
17.8
CHAPTER
18.1
xviii
18.2
18.3
18.4
18.5
18.5.1
18.5.2
18.5.3
18.5.4
18.5.5
18.5.6
18.5.7
18.5.8
18.5.9
18.5.10
18.5.10.1
18.5.10.2
18.5.10.3
18.5.10.4
18.5.10.5
18.5.10.6
18.5.10.7
18.5.10.8
18.6
18.7
18.7.1
18.7.2
18.7.3
18.7.3.1
18.7.3.2
18.7.3.3
18.7.3.4
18.7.4
18.7.5
18.7.6
18.7.7
18.7.8
18.7.9
18.7.10
18.7.11
18.7.12
18.8
Contents
CHAPTER
19.1
19.2
19.3
19.4
19.5
19.6
19.7
19.8
19.9
19.10
19.10.1
19.10.2
19.11
19.12
19.12.1
19.12.2
19.13
19.13.1
19.13.2
19.13.3
19.14
19.14.1
19.14.2
19.14.2.1
* 19.14.2.2
19.14.2.3
19.14.2.4
19.14.2.5
19.14.2.6
19.14.2.7
19.14.2.8
19.14.2.9
19.14.3
19.14.4
19.15
19.16
19.17
ELECTRONIC MAIL
CHAPTER
xx
20.1
20.2
20.3
20.4
20.4.1
20.4.2
20.5
20.5.1
20.5.2
20.6
20.6.1
20.6.2
20.6.3
20.7
20.7.1
20.8
20.8.1
20.8.2
20.8.3
20.9
20.10
20.11
20.12
20.13
20.14
20.14.1
20.15
20.16
20.16.1
20.16.2
20.17
CHAPTER
21.1
21.2
21.3
21.4
21.5
21.6
21.7
21.8
21.9
Contents
21.10
21.11
21.12
21.13
21.13.1
21.14
21.15
21.15.1
21.15.2
21.15.3
21.15.4
21.15.5
21.15.6
21.16
21.17
21.18
21.18.1
21.18.2
21.18.3
21.19
CHAPTER
22.1
22.2
22.3
22.4
22.5
22.6
22.7
22.8
22.9
22.9.1
22.9.2
22.10
22.10.1
22.10.2
LEFTOVERS
CHAPTER
23.1
23.2
23.3
xxii
23.4
23.5
23.6
23.7
CHAPTER
24.1
24.2
24.2.1
24.3
24.3.1
24.3.2
24.3.3
24.3.4
24.4
24.4.1
24.4.2
24.4.3
24.4.4
24.4.5
24.4.6
24.5
24.5.1
24.5.2
24.5.3
24.5.4
24.5.5
24.5.6
24.5.7
24.5.8
24.6
24.7
24.7.1
24.7.2
24.8
24.8.1
24.8.2
24.9
24.9.1
24.10
CHAPTER
Contents
25.1
25.2
25.3
25.4
25.5
25.5.1
25.5.2
25.5.3
25.6
25.6.1
25.6.2
25.6.3
25.6.4
25.6.5
25.6.6
25.7
CHAPTER
26.1
26.2
26.3
26.3.1
26.3.2
26.3.3
26.4
26.5
26.6
26.7
26.8
26.9
26.10
26.11
26.12
26.13
26.14
26.15
26.16
26.17
26.18
26.19
26.20
26.21
xxiv
26.22
26.23
26.24
26.25
26.25.1
26.25.2
26.25.2.1
26.25.2.2
26.25.2.3
26.25.3
26.26
26.27
Bibliography
Glossary
Index
|
any_adam_object | 1 |
author | Kaufman, Charlie Perlman, Radia Speciner, Mike |
author_facet | Kaufman, Charlie Perlman, Radia Speciner, Mike |
author_role | aut aut aut |
author_sort | Kaufman, Charlie |
author_variant | c k ck r p rp m s ms |
building | Verbundindex |
bvnumber | BV014328118 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 ST 276 |
classification_tum | DAT 461f DAT 256f |
ctrlnum | (OCoLC)248251061 (DE-599)BVBBV014328118 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02976nam a2200721 c 4500</leader><controlfield tag="001">BV014328118</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131108 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020604s2002 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0130460192</subfield><subfield code="9">0-13-046019-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248251061</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014328118</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 256f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kaufman, Charlie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security</subfield><subfield code="b">private communication in a public world</subfield><subfield code="c">Charlie Kaufman ; Radia Perlman ; Mike Speciner</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVI, 713 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Prentice Hall series in computer networking and distributed systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mailbox</subfield><subfield code="0">(DE-588)4114492-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Mailbox</subfield><subfield code="0">(DE-588)4114492-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Perlman, Radia</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Speciner, Mike</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009829167&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009829167</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV014328118 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:01:46Z |
institution | BVB |
isbn | 0130460192 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009829167 |
oclc_num | 248251061 |
open_access_boolean | |
owner | DE-739 DE-92 DE-91G DE-BY-TUM DE-703 DE-522 DE-355 DE-BY-UBR |
owner_facet | DE-739 DE-92 DE-91G DE-BY-TUM DE-703 DE-522 DE-355 DE-BY-UBR |
physical | XXVI, 713 S. Ill. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Prentice Hall |
record_format | marc |
series2 | Prentice Hall series in computer networking and distributed systems |
spelling | Kaufman, Charlie Verfasser aut Network security private communication in a public world Charlie Kaufman ; Radia Perlman ; Mike Speciner 2. ed. Upper Saddle River, NJ Prentice Hall 2002 XXVI, 713 S. Ill. txt rdacontent n rdamedia nc rdacarrier Prentice Hall series in computer networking and distributed systems Hier auch später erschienene, unveränderte Nachdrucke Computernetwerken gtt Databescherming gtt Computer security Computers Access control Electronic data processing departments Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Mailbox (DE-588)4114492-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s DE-604 Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Mailbox (DE-588)4114492-2 s 2\p DE-604 Kryptologie (DE-588)4033329-2 s 3\p DE-604 Datenschutz (DE-588)4011134-9 s 4\p DE-604 Perlman, Radia Verfasser aut Speciner, Mike Verfasser aut Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009829167&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kaufman, Charlie Perlman, Radia Speciner, Mike Network security private communication in a public world Computernetwerken gtt Databescherming gtt Computer security Computers Access control Electronic data processing departments Security measures Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Rechnernetz (DE-588)4070085-9 gnd Mailbox (DE-588)4114492-2 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4011134-9 (DE-588)4070085-9 (DE-588)4114492-2 (DE-588)4033329-2 (DE-588)4274324-2 |
title | Network security private communication in a public world |
title_auth | Network security private communication in a public world |
title_exact_search | Network security private communication in a public world |
title_full | Network security private communication in a public world Charlie Kaufman ; Radia Perlman ; Mike Speciner |
title_fullStr | Network security private communication in a public world Charlie Kaufman ; Radia Perlman ; Mike Speciner |
title_full_unstemmed | Network security private communication in a public world Charlie Kaufman ; Radia Perlman ; Mike Speciner |
title_short | Network security |
title_sort | network security private communication in a public world |
title_sub | private communication in a public world |
topic | Computernetwerken gtt Databescherming gtt Computer security Computers Access control Electronic data processing departments Security measures Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Rechnernetz (DE-588)4070085-9 gnd Mailbox (DE-588)4114492-2 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computernetwerken Databescherming Computer security Computers Access control Electronic data processing departments Security measures Datensicherung Datenschutz Rechnernetz Mailbox Kryptologie Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009829167&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kaufmancharlie networksecurityprivatecommunicationinapublicworld AT perlmanradia networksecurityprivatecommunicationinapublicworld AT specinermike networksecurityprivatecommunicationinapublicworld |