Computer security and cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley-Interscience
2007
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xvii, 521 pages) illustrations |
ISBN: | 9780470083970 0470083972 9780470083987 0470083980 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348698 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2007 |||| o||u| ||||||eng d | ||
020 | |a 9780470083970 |9 978-0-470-08397-0 | ||
020 | |a 0470083972 |9 0-470-08397-2 | ||
020 | |a 9780470083987 |9 978-0-470-08398-7 | ||
020 | |a 0470083980 |9 0-470-08398-0 | ||
035 | |a (ZDB-4-ITC)ocn123761153 | ||
035 | |a (OCoLC)123761153 | ||
035 | |a (DE-599)BVBBV045348698 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Konheim, Alan G. |d 1934- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer security and cryptography |c Alan G. Konheim |
264 | 1 | |a Hoboken, N.J. |b Wiley-Interscience |c 2007 | |
300 | |a 1 online resource (xvii, 521 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema | |
650 | 4 | |a Systemes informatiques / Securite / Mesures | |
650 | 4 | |a Cryptographie | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 4 | |a Computer security |a Cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Konheim, Alan G., 1934- |t Computer security and cryptography |d Hoboken, N.J. : Wiley-Interscience, 2007 |z 0471947830 |z 9780471947837 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735352 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179171931324416 |
---|---|
any_adam_object | |
author | Konheim, Alan G. 1934- |
author_facet | Konheim, Alan G. 1934- |
author_role | aut |
author_sort | Konheim, Alan G. 1934- |
author_variant | a g k ag agk |
building | Verbundindex |
bvnumber | BV045348698 |
collection | ZDB-4-ITC |
contents | Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema |
ctrlnum | (ZDB-4-ITC)ocn123761153 (OCoLC)123761153 (DE-599)BVBBV045348698 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02302nmm a2200517zc 4500</leader><controlfield tag="001">BV045348698</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470083970</subfield><subfield code="9">978-0-470-08397-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470083972</subfield><subfield code="9">0-470-08397-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470083987</subfield><subfield code="9">978-0-470-08398-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470083980</subfield><subfield code="9">0-470-08398-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn123761153</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)123761153</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348698</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Konheim, Alan G.</subfield><subfield code="d">1934-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security and cryptography</subfield><subfield code="c">Alan G. Konheim</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley-Interscience</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 521 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systemes informatiques / Securite / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Konheim, Alan G., 1934-</subfield><subfield code="t">Computer security and cryptography</subfield><subfield code="d">Hoboken, N.J. : Wiley-Interscience, 2007</subfield><subfield code="z">0471947830</subfield><subfield code="z">9780471947837</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735352</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045348698 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 9780470083970 0470083972 9780470083987 0470083980 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735352 |
oclc_num | 123761153 |
open_access_boolean | |
physical | 1 online resource (xvii, 521 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley-Interscience |
record_format | marc |
spelling | Konheim, Alan G. 1934- Verfasser aut Computer security and cryptography Alan G. Konheim Hoboken, N.J. Wiley-Interscience 2007 1 online resource (xvii, 521 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Print version record Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema Systemes informatiques / Securite / Mesures Cryptographie COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cryptography fast Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Erscheint auch als Druck-Ausgabe Konheim, Alan G., 1934- Computer security and cryptography Hoboken, N.J. : Wiley-Interscience, 2007 0471947830 9780471947837 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Konheim, Alan G. 1934- Computer security and cryptography Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema Systemes informatiques / Securite / Mesures Cryptographie COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cryptography fast Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4011144-1 |
title | Computer security and cryptography |
title_auth | Computer security and cryptography |
title_exact_search | Computer security and cryptography |
title_full | Computer security and cryptography Alan G. Konheim |
title_fullStr | Computer security and cryptography Alan G. Konheim |
title_full_unstemmed | Computer security and cryptography Alan G. Konheim |
title_short | Computer security and cryptography |
title_sort | computer security and cryptography |
topic | Systemes informatiques / Securite / Mesures Cryptographie COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Cryptography fast Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Systemes informatiques / Securite / Mesures Cryptographie COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Cryptography Computer security Cryptography Kryptologie Datensicherung |
work_keys_str_mv | AT konheimalang computersecurityandcryptography |