Modern cryptography: applied mathematics for encryption and information security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2022
|
Ausgabe: | Second edition |
Schlagworte: | |
Beschreibung: | xxiv, 453 Seiten Illustrationen, Diagramme |
ISBN: | 9783031123030 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048631297 | ||
003 | DE-604 | ||
005 | 20230228 | ||
007 | t | ||
008 | 230105s2022 sz a||| |||| 00||| eng d | ||
020 | |a 9783031123030 |c Hardback |9 978-3-031-12303-0 | ||
035 | |a (OCoLC)1372486572 | ||
035 | |a (DE-599)BVBBV048631297 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-11 | ||
082 | 0 | |a 621.382 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Easttom, Chuck |d 1968- |e Verfasser |0 (DE-588)1079935274 |4 aut | |
245 | 1 | 0 | |a Modern cryptography |b applied mathematics for encryption and information security |c Chuck Easttom |
250 | |a Second edition | ||
264 | 1 | |a Cham |b Springer |c 2022 | |
300 | |a xxiv, 453 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computational Number Theory | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Applied Statistics | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Information theory | |
650 | 4 | |a Number theory | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Statistics | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-031-12304-7 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034006318 |
Datensatz im Suchindex
_version_ | 1804184763822505984 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Easttom, Chuck 1968- |
author_GND | (DE-588)1079935274 |
author_facet | Easttom, Chuck 1968- |
author_role | aut |
author_sort | Easttom, Chuck 1968- |
author_variant | c e ce |
building | Verbundindex |
bvnumber | BV048631297 |
classification_rvk | ST 276 SK 170 |
classification_tum | DAT 000 |
ctrlnum | (OCoLC)1372486572 (DE-599)BVBBV048631297 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Mathematik Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Informatik Mathematik Elektrotechnik / Elektronik / Nachrichtentechnik |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01604nam a2200493zc 4500</leader><controlfield tag="001">BV048631297</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230228 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230105s2022 sz a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031123030</subfield><subfield code="c">Hardback</subfield><subfield code="9">978-3-031-12303-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1372486572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048631297</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Easttom, Chuck</subfield><subfield code="d">1968-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1079935274</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modern cryptography</subfield><subfield code="b">applied mathematics for encryption and information security</subfield><subfield code="c">Chuck Easttom</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiv, 453 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Number Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applied Statistics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Statistics </subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-031-12304-7</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034006318</subfield></datafield></record></collection> |
id | DE-604.BV048631297 |
illustrated | Illustrated |
index_date | 2024-07-03T21:16:03Z |
indexdate | 2024-07-10T09:44:31Z |
institution | BVB |
isbn | 9783031123030 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034006318 |
oclc_num | 1372486572 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xxiv, 453 Seiten Illustrationen, Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer |
record_format | marc |
spelling | Easttom, Chuck 1968- Verfasser (DE-588)1079935274 aut Modern cryptography applied mathematics for encryption and information security Chuck Easttom Second edition Cham Springer 2022 xxiv, 453 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Communications Engineering, Networks Data Structures and Information Theory Computational Number Theory Data and Information Security Computational Intelligence Applied Statistics Telecommunication Data structures (Computer science) Information theory Number theory Data protection Computational intelligence Statistics Erscheint auch als Online-Ausgabe 978-3-031-12304-7 |
spellingShingle | Easttom, Chuck 1968- Modern cryptography applied mathematics for encryption and information security Communications Engineering, Networks Data Structures and Information Theory Computational Number Theory Data and Information Security Computational Intelligence Applied Statistics Telecommunication Data structures (Computer science) Information theory Number theory Data protection Computational intelligence Statistics |
title | Modern cryptography applied mathematics for encryption and information security |
title_auth | Modern cryptography applied mathematics for encryption and information security |
title_exact_search | Modern cryptography applied mathematics for encryption and information security |
title_exact_search_txtP | Modern cryptography applied mathematics for encryption and information security |
title_full | Modern cryptography applied mathematics for encryption and information security Chuck Easttom |
title_fullStr | Modern cryptography applied mathematics for encryption and information security Chuck Easttom |
title_full_unstemmed | Modern cryptography applied mathematics for encryption and information security Chuck Easttom |
title_short | Modern cryptography |
title_sort | modern cryptography applied mathematics for encryption and information security |
title_sub | applied mathematics for encryption and information security |
topic | Communications Engineering, Networks Data Structures and Information Theory Computational Number Theory Data and Information Security Computational Intelligence Applied Statistics Telecommunication Data structures (Computer science) Information theory Number theory Data protection Computational intelligence Statistics |
topic_facet | Communications Engineering, Networks Data Structures and Information Theory Computational Number Theory Data and Information Security Computational Intelligence Applied Statistics Telecommunication Data structures (Computer science) Information theory Number theory Data protection Computational intelligence Statistics |
work_keys_str_mv | AT easttomchuck moderncryptographyappliedmathematicsforencryptionandinformationsecurity |