Cryptography engineering: design principles and practical applications
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley Pub., Inc.
[2010]
|
Schlagworte: | |
Online-Zugang: | FHA01 FHR01 FRO01 TUM01 UBG01 UBR01 Volltext |
Beschreibung: | 1 Online-Ressource (xxix, 353 Seiten) |
ISBN: | 9781118722367 1118722361 9781118502822 1118502825 9781118080917 1118080912 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043394974 | ||
003 | DE-604 | ||
005 | 20230918 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781118722367 |c electronic bk. |9 978-1-118-72236-7 | ||
020 | |a 1118722361 |c electronic bk. |9 1-118-72236-1 | ||
020 | |a 9781118502822 |c electronic bk. |9 978-1-118-50282-2 | ||
020 | |a 1118502825 |c electronic bk. |9 1-118-50282-5 | ||
020 | |a 9781118080917 |c electronic bk. |9 978-1-118-08091-7 | ||
020 | |a 1118080912 |c electronic bk. |9 1-118-08091-2 | ||
024 | 7 | |a 10.1002/9781118722367 |2 doi | |
035 | |a (ZDB-35-WIC)ocn806039884 | ||
035 | |a (OCoLC)806039884 | ||
035 | |a (DE-599)BVBBV043394974 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-Aug4 |a DE-861 |a DE-473 |a DE-898 |a DE-355 | ||
082 | 0 | |a 005.8/2 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Ferguson, Niels |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cryptography engineering |b design principles and practical applications |c Tadayoshi Kohno, Niels Ferguson, Bruce Schneier |
264 | 1 | |a Indianapolis, IN |b Wiley Pub., Inc. |c [2010] | |
264 | 4 | |c © 2010 | |
300 | |a 1 Online-Ressource (xxix, 353 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Includes bibliographical references and index | |
505 | 8 | |a Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Computersicherheit |2 swd | |
650 | 7 | |a Kryptologie |2 swd | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Schneier, Bruce |d 1963- |e Verfasser |0 (DE-588)123003180 |4 aut | |
700 | 1 | |a Kohno, Tadayoshi |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-470-47424-2 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-35-UBC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028813558 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l FHR01 |p ZDB-35-WIC |q FHR_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l TUM01 |p ZDB-35-WIC |q TUM_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l UBG01 |p ZDB-35-WIC |q UBG_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |l UBR01 |p ZDB-35-UBC |q UBR EBS Auswahl 2022 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175974295666688 |
---|---|
any_adam_object | |
author | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi |
author_GND | (DE-588)123003180 |
author_facet | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi |
author_role | aut aut aut |
author_sort | Ferguson, Niels |
author_variant | n f nf b s bs t k tk |
building | Verbundindex |
bvnumber | BV043394974 |
classification_rvk | ST 276 |
collection | ZDB-35-WIC ZDB-35-UBC |
contents | Includes bibliographical references and index Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start |
ctrlnum | (ZDB-35-WIC)ocn806039884 (OCoLC)806039884 (DE-599)BVBBV043394974 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03324nmm a2200673zc 4500</leader><controlfield tag="001">BV043394974</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230918 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118722367</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-72236-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118722361</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-72236-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118502822</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-50282-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118502825</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-50282-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118080917</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-08091-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118080912</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-08091-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781118722367</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn806039884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)806039884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043394974</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferguson, Niels</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography engineering</subfield><subfield code="b">design principles and practical applications</subfield><subfield code="c">Tadayoshi Kohno, Niels Ferguson, Bruce Schneier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley Pub., Inc.</subfield><subfield code="c">[2010]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxix, 353 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="2">swd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schneier, Bruce</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123003180</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kohno, Tadayoshi</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-470-47424-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-35-UBC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028813558</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHR_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">TUM_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-35-UBC</subfield><subfield code="q">UBR EBS Auswahl 2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043394974 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:48Z |
institution | BVB |
isbn | 9781118722367 1118722361 9781118502822 1118502825 9781118080917 1118080912 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028813558 |
oclc_num | 806039884 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-Aug4 DE-861 DE-473 DE-BY-UBG DE-898 DE-BY-UBR DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-Aug4 DE-861 DE-473 DE-BY-UBG DE-898 DE-BY-UBR DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (xxix, 353 Seiten) |
psigel | ZDB-35-WIC ZDB-35-UBC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC FHR_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC TUM_PDA_WIC_Kauf ZDB-35-WIC UBG_Einzelkauf ZDB-35-UBC UBR EBS Auswahl 2022 |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley Pub., Inc. |
record_format | marc |
spelling | Ferguson, Niels Verfasser aut Cryptography engineering design principles and practical applications Tadayoshi Kohno, Niels Ferguson, Bruce Schneier Indianapolis, IN Wiley Pub., Inc. [2010] © 2010 1 Online-Ressource (xxix, 353 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computersicherheit swd Kryptologie swd Cryptography Computer security Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Computersicherheit (DE-588)4274324-2 s DE-604 Schneier, Bruce 1963- Verfasser (DE-588)123003180 aut Kohno, Tadayoshi Verfasser aut Erscheint auch als Druckausgabe 978-0-470-47424-2 https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi Cryptography engineering design principles and practical applications Includes bibliographical references and index Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computersicherheit swd Kryptologie swd Cryptography Computer security Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4274324-2 |
title | Cryptography engineering design principles and practical applications |
title_auth | Cryptography engineering design principles and practical applications |
title_exact_search | Cryptography engineering design principles and practical applications |
title_full | Cryptography engineering design principles and practical applications Tadayoshi Kohno, Niels Ferguson, Bruce Schneier |
title_fullStr | Cryptography engineering design principles and practical applications Tadayoshi Kohno, Niels Ferguson, Bruce Schneier |
title_full_unstemmed | Cryptography engineering design principles and practical applications Tadayoshi Kohno, Niels Ferguson, Bruce Schneier |
title_short | Cryptography engineering |
title_sort | cryptography engineering design principles and practical applications |
title_sub | design principles and practical applications |
topic | COMPUTERS / Security / Cryptography bisacsh Computer security fast Cryptography fast Computersicherheit swd Kryptologie swd Cryptography Computer security Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | COMPUTERS / Security / Cryptography Computer security Cryptography Computersicherheit Kryptologie |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781118722367 |
work_keys_str_mv | AT fergusonniels cryptographyengineeringdesignprinciplesandpracticalapplications AT schneierbruce cryptographyengineeringdesignprinciplesandpracticalapplications AT kohnotadayoshi cryptographyengineeringdesignprinciplesandpracticalapplications |