Computer security and cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley-Interscience
©2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION. Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema |
Beschreibung: | 1 Online-Ressource (xvii, 521 pages) |
ISBN: | 0470083972 0470083980 0471947830 9780470083970 9780470083987 9780471947837 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043090009 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0470083972 |c electronic bk. |9 0-470-08397-2 | ||
020 | |a 0470083980 |9 0-470-08398-0 | ||
020 | |a 0471947830 |9 0-471-94783-0 | ||
020 | |a 9780470083970 |c electronic bk. |9 978-0-470-08397-0 | ||
020 | |a 9780470083987 |9 978-0-470-08398-7 | ||
020 | |a 9780471947837 |9 978-0-471-94783-7 | ||
035 | |a (OCoLC)123761153 | ||
035 | |a (DE-599)BVBBV043090009 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Konheim, Alan G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer security and cryptography |c Alan G. Konheim |
264 | 1 | |a Hoboken, N.J. |b Wiley-Interscience |c ©2007 | |
300 | |a 1 Online-Ressource (xvii, 521 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION. | ||
500 | |a Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Ciphers | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Cryptography / History | |
650 | 4 | |a Systèmes informatiques / Sécurité / Mesures | |
650 | 4 | |a Cryptographie | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 4 | |a Geschichte | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028514201 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175490081095680 |
---|---|
any_adam_object | |
author | Konheim, Alan G. |
author_facet | Konheim, Alan G. |
author_role | aut |
author_sort | Konheim, Alan G. |
author_variant | a g k ag agk |
building | Verbundindex |
bvnumber | BV043090009 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)123761153 (DE-599)BVBBV043090009 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03499nmm a2200661zc 4500</leader><controlfield tag="001">BV043090009</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470083972</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-08397-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470083980</subfield><subfield code="9">0-470-08398-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471947830</subfield><subfield code="9">0-471-94783-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470083970</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-08397-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470083987</subfield><subfield code="9">978-0-470-08398-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471947837</subfield><subfield code="9">978-0-471-94783-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)123761153</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043090009</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Konheim, Alan G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security and cryptography</subfield><subfield code="c">Alan G. Konheim</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 521 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ciphers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography / History</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes informatiques / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geschichte</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028514201</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043090009 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:07Z |
institution | BVB |
isbn | 0470083972 0470083980 0471947830 9780470083970 9780470083987 9780471947837 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028514201 |
oclc_num | 123761153 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xvii, 521 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley-Interscience |
record_format | marc |
spelling | Konheim, Alan G. Verfasser aut Computer security and cryptography Alan G. Konheim Hoboken, N.J. Wiley-Interscience ©2007 1 Online-Ressource (xvii, 521 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION. Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema Computer security Cryptography Ciphers Data encryption (Computer science) Cryptography / History Systèmes informatiques / Sécurité / Mesures Cryptographie COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cryptography fast Geschichte Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Konheim, Alan G. Computer security and cryptography Computer security Cryptography Ciphers Data encryption (Computer science) Cryptography / History Systèmes informatiques / Sécurité / Mesures Cryptographie COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cryptography fast Geschichte Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4033329-2 |
title | Computer security and cryptography |
title_auth | Computer security and cryptography |
title_exact_search | Computer security and cryptography |
title_full | Computer security and cryptography Alan G. Konheim |
title_fullStr | Computer security and cryptography Alan G. Konheim |
title_full_unstemmed | Computer security and cryptography Alan G. Konheim |
title_short | Computer security and cryptography |
title_sort | computer security and cryptography |
topic | Computer security Cryptography Ciphers Data encryption (Computer science) Cryptography / History Systèmes informatiques / Sécurité / Mesures Cryptographie COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cryptography fast Geschichte Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Cryptography Ciphers Data encryption (Computer science) Cryptography / History Systèmes informatiques / Sécurité / Mesures Cryptographie COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Geschichte Datensicherung Kryptologie |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=188322 |
work_keys_str_mv | AT konheimalang computersecurityandcryptography |