Hashing in computer science: fifty years of slicing and dicing
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley
© 2010
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Beschreibung: | Includes bibliographical references and index Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires |
Beschreibung: | 1 Online-Ressource (xvii, 386 pages) |
ISBN: | 9780470630600 0470630604 9780470630617 0470630612 9781118031834 1118031830 1282686275 9781282686274 9780470344736 0470344733 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043391995 | ||
003 | DE-604 | ||
005 | 20200511 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2010 |||| o||u| ||||||eng d | ||
020 | |a 9780470630600 |c electronic bk. |9 978-0-470-63060-0 | ||
020 | |a 0470630604 |c electronic bk. |9 0-470-63060-4 | ||
020 | |a 9780470630617 |c electronic bk. |9 978-0-470-63061-7 | ||
020 | |a 0470630612 |c electronic bk. |9 0-470-63061-2 | ||
020 | |a 9781118031834 |9 978-1-118-03183-4 | ||
020 | |a 1118031830 |9 1-118-03183-0 | ||
020 | |a 1282686275 |9 1-282-68627-5 | ||
020 | |a 9781282686274 |9 978-1-282-68627-4 | ||
020 | |a 9780470344736 |9 978-0-470-34473-6 | ||
020 | |a 0470344733 |9 0-470-34473-3 | ||
024 | 7 | |a 10.1002/9780470630617 |2 doi | |
035 | |a (ZDB-35-WIC)ocn651933944 | ||
035 | |a (OCoLC)651933944 | ||
035 | |a (DE-599)BVBBV043391995 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 005.8/2 | |
100 | 1 | |a Konheim, Alan G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hashing in computer science |b fifty years of slicing and dicing |c Alan G. Konheim |
264 | 1 | |a Hoboken, N.J. |b Wiley |c © 2010 | |
300 | |a 1 Online-Ressource (xvii, 386 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires | ||
650 | 4 | |a Hashing (Computer science) | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer security | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Hashing (Computer science) |2 fast | |
650 | 4 | |a Hashing (Computer science) | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer security | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-WEL | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028810579 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175967961219072 |
---|---|
any_adam_object | |
author | Konheim, Alan G. |
author_facet | Konheim, Alan G. |
author_role | aut |
author_sort | Konheim, Alan G. |
author_variant | a g k ag agk |
building | Verbundindex |
bvnumber | BV043391995 |
collection | ZDB-35-WIC ZDB-35-WEL |
ctrlnum | (ZDB-35-WIC)ocn651933944 (OCoLC)651933944 (DE-599)BVBBV043391995 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02975nmm a2200637zc 4500</leader><controlfield tag="001">BV043391995</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200511 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470630600</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-63060-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470630604</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-63060-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470630617</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-63061-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470630612</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-63061-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118031834</subfield><subfield code="9">978-1-118-03183-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118031830</subfield><subfield code="9">1-118-03183-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282686275</subfield><subfield code="9">1-282-68627-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282686274</subfield><subfield code="9">978-1-282-68627-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470344736</subfield><subfield code="9">978-0-470-34473-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470344733</subfield><subfield code="9">0-470-34473-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9780470630617</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn651933944</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)651933944</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043391995</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Konheim, Alan G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hashing in computer science</subfield><subfield code="b">fifty years of slicing and dicing</subfield><subfield code="c">Alan G. Konheim</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley</subfield><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 386 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hashing (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hashing (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hashing (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-WEL</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028810579</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043391995 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:42Z |
institution | BVB |
isbn | 9780470630600 0470630604 9780470630617 0470630612 9781118031834 1118031830 1282686275 9781282686274 9780470344736 0470344733 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028810579 |
oclc_num | 651933944 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource (xvii, 386 pages) |
psigel | ZDB-35-WIC ZDB-35-WEL UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley |
record_format | marc |
spelling | Konheim, Alan G. Verfasser aut Hashing in computer science fifty years of slicing and dicing Alan G. Konheim Hoboken, N.J. Wiley © 2010 1 Online-Ressource (xvii, 386 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires Hashing (Computer science) Cryptography Data encryption (Computer science) Computer security COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Data encryption (Computer science) fast Hashing (Computer science) fast https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Konheim, Alan G. Hashing in computer science fifty years of slicing and dicing Hashing (Computer science) Cryptography Data encryption (Computer science) Computer security COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Data encryption (Computer science) fast Hashing (Computer science) fast |
title | Hashing in computer science fifty years of slicing and dicing |
title_auth | Hashing in computer science fifty years of slicing and dicing |
title_exact_search | Hashing in computer science fifty years of slicing and dicing |
title_full | Hashing in computer science fifty years of slicing and dicing Alan G. Konheim |
title_fullStr | Hashing in computer science fifty years of slicing and dicing Alan G. Konheim |
title_full_unstemmed | Hashing in computer science fifty years of slicing and dicing Alan G. Konheim |
title_short | Hashing in computer science |
title_sort | hashing in computer science fifty years of slicing and dicing |
title_sub | fifty years of slicing and dicing |
topic | Hashing (Computer science) Cryptography Data encryption (Computer science) Computer security COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Data encryption (Computer science) fast Hashing (Computer science) fast |
topic_facet | Hashing (Computer science) Cryptography Data encryption (Computer science) Computer security COMPUTERS / Security / Cryptography |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9780470630617 |
work_keys_str_mv | AT konheimalang hashingincomputersciencefiftyyearsofslicinganddicing |