Innovative cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Charles River Media
c2007
|
Ausgabe: | 2nd ed |
Schriftenreihe: | Charles River Media programming series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references (p. 371-376) and index Cryptography in the information age -- Flexible software ciphers -- Substitution-permutation networks with minimal controlled elements -- Switched controlled operations -- Designing fast ciphers based on controlled operations |
Beschreibung: | 1 Online-Ressource (xiii, 386 p.) |
ISBN: | 1584506547 9781584504672 9781584506546 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043101991 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 1584506547 |c electronic bk. |9 1-58450-654-7 | ||
020 | |a 9781584504672 |9 978-1-58450-467-2 | ||
020 | |a 9781584506546 |c electronic bk. |9 978-1-58450-654-6 | ||
035 | |a (OCoLC)290578108 | ||
035 | |a (DE-599)BVBBV043101991 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/2 |2 22 | |
100 | 1 | |a Moldovyan, Nick |e Verfasser |4 aut | |
245 | 1 | 0 | |a Innovative cryptography |c Nick Moldovyan, Alex Moldovyan |
250 | |a 2nd ed | ||
264 | 1 | |a Boston |b Charles River Media |c c2007 | |
300 | |a 1 Online-Ressource (xiii, 386 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Charles River Media programming series | |
500 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Includes bibliographical references (p. 371-376) and index | ||
500 | |a Cryptography in the information age -- Flexible software ciphers -- Substitution-permutation networks with minimal controlled elements -- Switched controlled operations -- Designing fast ciphers based on controlled operations | ||
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Sécurité informatique | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Telecommunication / Security measures |2 fast | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Telecommunication |x Security measures | |
650 | 4 | |a Cryptography | |
700 | 1 | |a Moldovyan, Alex |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-58450-467-6 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028526183 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175513000869888 |
---|---|
any_adam_object | |
author | Moldovyan, Nick |
author_facet | Moldovyan, Nick |
author_role | aut |
author_sort | Moldovyan, Nick |
author_variant | n m nm |
building | Verbundindex |
bvnumber | BV043101991 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)290578108 (DE-599)BVBBV043101991 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02519nmm a2200529zc 4500</leader><controlfield tag="001">BV043101991</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1584506547</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-58450-654-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781584504672</subfield><subfield code="9">978-1-58450-467-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781584506546</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-58450-654-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)290578108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043101991</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Moldovyan, Nick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Innovative cryptography</subfield><subfield code="c">Nick Moldovyan, Alex Moldovyan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Charles River Media</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 386 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Charles River Media programming series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 371-376) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cryptography in the information age -- Flexible software ciphers -- Substitution-permutation networks with minimal controlled elements -- Switched controlled operations -- Designing fast ciphers based on controlled operations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Moldovyan, Alex</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-58450-467-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028526183</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043101991 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:28Z |
institution | BVB |
isbn | 1584506547 9781584504672 9781584506546 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028526183 |
oclc_num | 290578108 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiii, 386 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Charles River Media |
record_format | marc |
series2 | Charles River Media programming series |
spelling | Moldovyan, Nick Verfasser aut Innovative cryptography Nick Moldovyan, Alex Moldovyan 2nd ed Boston Charles River Media c2007 1 Online-Ressource (xiii, 386 p.) txt rdacontent c rdamedia cr rdacarrier Charles River Media programming series Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references (p. 371-376) and index Cryptography in the information age -- Flexible software ciphers -- Substitution-permutation networks with minimal controlled elements -- Switched controlled operations -- Designing fast ciphers based on controlled operations Chiffrement (Informatique) Sécurité informatique COMPUTERS / Security / Cryptography bisacsh Cryptography fast Data encryption (Computer science) fast Telecommunication / Security measures fast Data encryption (Computer science) Telecommunication Security measures Cryptography Moldovyan, Alex Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 1-58450-467-6 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214 Aggregator Volltext |
spellingShingle | Moldovyan, Nick Innovative cryptography Chiffrement (Informatique) Sécurité informatique COMPUTERS / Security / Cryptography bisacsh Cryptography fast Data encryption (Computer science) fast Telecommunication / Security measures fast Data encryption (Computer science) Telecommunication Security measures Cryptography |
title | Innovative cryptography |
title_auth | Innovative cryptography |
title_exact_search | Innovative cryptography |
title_full | Innovative cryptography Nick Moldovyan, Alex Moldovyan |
title_fullStr | Innovative cryptography Nick Moldovyan, Alex Moldovyan |
title_full_unstemmed | Innovative cryptography Nick Moldovyan, Alex Moldovyan |
title_short | Innovative cryptography |
title_sort | innovative cryptography |
topic | Chiffrement (Informatique) Sécurité informatique COMPUTERS / Security / Cryptography bisacsh Cryptography fast Data encryption (Computer science) fast Telecommunication / Security measures fast Data encryption (Computer science) Telecommunication Security measures Cryptography |
topic_facet | Chiffrement (Informatique) Sécurité informatique COMPUTERS / Security / Cryptography Cryptography Data encryption (Computer science) Telecommunication / Security measures Telecommunication Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=233214 |
work_keys_str_mv | AT moldovyannick innovativecryptography AT moldovyanalex innovativecryptography |