Cryptography engineering: design principles and practical applications
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
2010
|
Schlagworte: | |
Online-Zugang: | DE-Aug4 DE-898 DE-861 DE-188 DE-91 DE-473 DE-355 URL des Erstveröffentlichers |
Zusammenfassung: | Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start |
Beschreibung: | 1 Online-Ressource (XXIX, 353 S.) graph. Darst. |
ISBN: | 9781118722367 9781118502822 9781118080917 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043394974 | ||
003 | DE-604 | ||
005 | 20241206 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2010 xx d||| o|||| 00||| eng d | ||
020 | |a 9781118722367 |c Online |9 978-1-118-72236-7 | ||
020 | |a 9781118502822 |c electronic bk. |9 978-1-118-50282-2 | ||
020 | |a 9781118080917 |c electronic bk. |9 978-1-118-08091-7 | ||
024 | 7 | |a 10.1002/9781118722367 |2 doi | |
035 | |a (ZDB-35-WIC)ocn806039884 | ||
035 | |a (OCoLC)806039884 | ||
035 | |a (DE-599)BVBBV043394974 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-Aug4 |a DE-861 |a DE-473 |a DE-898 |a DE-355 |a DE-188 | ||
082 | 0 | |a 005.8/2 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Ferguson, Niels |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cryptography engineering |b design principles and practical applications |c Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2010 | |
300 | |a 1 Online-Ressource (XXIX, 353 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Computersicherheit |2 swd | |
650 | 7 | |a Kryptologie |2 swd | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Schneier, Bruce |d 1963- |e Verfasser |0 (DE-588)123003180 |4 aut | |
700 | 1 | |a Kohno, Tadayoshi |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-470-47424-2 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
912 | |a ZDB-35-UBC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028813558 | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l DE-Aug4 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l DE-898 |p ZDB-35-WIC |q FHR_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l DE-861 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l DE-188 |p ZDB-35-WIC |q ZDB-35-WIC 2023 |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l DE-91 |p ZDB-35-WIC |q TUM_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l DE-473 |p ZDB-35-WIC |q UBG_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l DE-355 |p ZDB-35-UBC |q UBR EBS Auswahl 2022 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1817704475873247232 |
---|---|
adam_text | |
any_adam_object | |
author | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi |
author_GND | (DE-588)123003180 |
author_facet | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi |
author_role | aut aut aut |
author_sort | Ferguson, Niels |
author_variant | n f nf b s bs t k tk |
building | Verbundindex |
bvnumber | BV043394974 |
classification_rvk | ST 276 |
collection | ZDB-35-WIC ZDB-35-UBC |
contents | Includes bibliographical references and index Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start |
ctrlnum | (ZDB-35-WIC)ocn806039884 (OCoLC)806039884 (DE-599)BVBBV043394974 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV043394974</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241206</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2010 xx d||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118722367</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-118-72236-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118502822</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-50282-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118080917</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-08091-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118722367</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn806039884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)806039884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043394974</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferguson, Niels</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography engineering</subfield><subfield code="b">design principles and practical applications</subfield><subfield code="c">Niels Ferguson, Bruce Schneier, Tadayoshi Kohno</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIX, 353 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schneier, Bruce</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123003180</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kohno, Tadayoshi</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-470-47424-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-UBC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028813558</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHR_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">DE-188</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">ZDB-35-WIC 2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">TUM_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-35-UBC</subfield><subfield code="q">UBR EBS Auswahl 2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043394974 |
illustrated | Illustrated |
indexdate | 2024-12-06T15:14:33Z |
institution | BVB |
isbn | 9781118722367 9781118502822 9781118080917 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028813558 |
oclc_num | 806039884 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-Aug4 DE-861 DE-473 DE-BY-UBG DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-188 |
owner_facet | DE-91 DE-BY-TUM DE-Aug4 DE-861 DE-473 DE-BY-UBG DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-188 |
physical | 1 Online-Ressource (XXIX, 353 S.) graph. Darst. |
psigel | ZDB-35-WIC ZDB-35-UBC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC FHR_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC ZDB-35-WIC 2023 ZDB-35-WIC TUM_PDA_WIC_Kauf ZDB-35-WIC UBG_Einzelkauf ZDB-35-UBC UBR EBS Auswahl 2022 |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley |
record_format | marc |
spelling | Ferguson, Niels Verfasser aut Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno Indianapolis, IN Wiley 2010 1 Online-Ressource (XXIX, 353 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computersicherheit swd Kryptologie swd Cryptography Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Computersicherheit (DE-588)4274324-2 s DE-604 Schneier, Bruce 1963- Verfasser (DE-588)123003180 aut Kohno, Tadayoshi Verfasser aut Erscheint auch als Druck-Ausgabe, Paperback 978-0-470-47424-2 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi Cryptography engineering design principles and practical applications Includes bibliographical references and index Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computersicherheit swd Kryptologie swd Cryptography Computer security Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033329-2 |
title | Cryptography engineering design principles and practical applications |
title_auth | Cryptography engineering design principles and practical applications |
title_exact_search | Cryptography engineering design principles and practical applications |
title_full | Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
title_fullStr | Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
title_full_unstemmed | Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
title_short | Cryptography engineering |
title_sort | cryptography engineering design principles and practical applications |
title_sub | design principles and practical applications |
topic | COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computersicherheit swd Kryptologie swd Cryptography Computer security Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | COMPUTERS / Security / Cryptography Computer security Cryptography Computersicherheit Kryptologie |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |
work_keys_str_mv | AT fergusonniels cryptographyengineeringdesignprinciplesandpracticalapplications AT schneierbruce cryptographyengineeringdesignprinciplesandpracticalapplications AT kohnotadayoshi cryptographyengineeringdesignprinciplesandpracticalapplications |