Cryptography's role in securing the information society /:
"For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington, DC :
National Academy Press,
1996.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions." "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket. |
Beschreibung: | "Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council." |
Beschreibung: | 1 online resource (xxx, 688 pages) |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 0309054753 9780309054751 0585025258 9780585025254 9780309522540 0309522544 9780309175807 0309175801 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm57135909 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 041202s1996 dcu ob 001 0 eng c | ||
010 | |a 96068943 | ||
040 | |a BUF |b eng |e pn |c BUF |d OCLCQ |d N$T |d YDXCP |d TUU |d TNF |d OCLCE |d E7B |d MERUC |d CCO |d CUS |d FVL |d OCLCQ |d ORU |d OCLCQ |d ZCU |d P4I |d OCLCQ |d DKDLA |d OCLCQ |d UV0 |d OCLCQ |d LOA |d AZK |d OCLCQ |d MWM |d INTCL |d COCUF |d AGLDB |d SUR |d MOR |d PIFBR |d OCLCA |d OCLCQ |d U3W |d LUE |d OCLCF |d STF |d WRM |d OCLCQ |d VTS |d NRAMU |d EZ9 |d VT2 |d OCLCQ |d CGU |d WYU |d GDC |d JZ6 |d U3G |d M8D |d UKAHL |d UKCRE |d PTL |d INARC |d AJS |d CNNOR |d REDDC |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 42329133 |a 70731958 |a 559169226 |a 605360316 |a 609921600 |a 722182832 |a 728007004 |a 960204598 |a 961627880 |a 961690383 |a 962680477 |a 962713828 |a 970764976 |a 975242829 |a 975300529 |a 984856734 |a 988498271 |a 991917235 |a 1017612828 |a 1018005929 |a 1037929114 |a 1038632966 |a 1044642364 |a 1045382579 |a 1045386768 |a 1047527262 |a 1048244205 |a 1048751309 |a 1055338167 |a 1064119694 |a 1065752406 |a 1081056751 |a 1081271208 |a 1086971066 |a 1153542731 |a 1156337747 |a 1162448084 |a 1182011549 |a 1188979714 |a 1196972512 |a 1228540946 |a 1249236562 |a 1252404187 |a 1257346544 |a 1257376248 |a 1289811714 | ||
020 | |a 0309054753 |q (Online version) | ||
020 | |a 9780309054751 |q (Online version) | ||
020 | |a 0585025258 |q (electronic bk.) | ||
020 | |a 9780585025254 |q (electronic bk.) | ||
020 | |a 9780309522540 |q (pdf) | ||
020 | |a 0309522544 |q (pdf) | ||
020 | |z 0305054753 | ||
020 | |a 9780309175807 |q (e-book) | ||
020 | |a 0309175801 | ||
035 | |a (OCoLC)57135909 |z (OCoLC)42329133 |z (OCoLC)70731958 |z (OCoLC)559169226 |z (OCoLC)605360316 |z (OCoLC)609921600 |z (OCoLC)722182832 |z (OCoLC)728007004 |z (OCoLC)960204598 |z (OCoLC)961627880 |z (OCoLC)961690383 |z (OCoLC)962680477 |z (OCoLC)962713828 |z (OCoLC)970764976 |z (OCoLC)975242829 |z (OCoLC)975300529 |z (OCoLC)984856734 |z (OCoLC)988498271 |z (OCoLC)991917235 |z (OCoLC)1017612828 |z (OCoLC)1018005929 |z (OCoLC)1037929114 |z (OCoLC)1038632966 |z (OCoLC)1044642364 |z (OCoLC)1045382579 |z (OCoLC)1045386768 |z (OCoLC)1047527262 |z (OCoLC)1048244205 |z (OCoLC)1048751309 |z (OCoLC)1055338167 |z (OCoLC)1064119694 |z (OCoLC)1065752406 |z (OCoLC)1081056751 |z (OCoLC)1081271208 |z (OCoLC)1086971066 |z (OCoLC)1153542731 |z (OCoLC)1156337747 |z (OCoLC)1162448084 |z (OCoLC)1182011549 |z (OCoLC)1188979714 |z (OCoLC)1196972512 |z (OCoLC)1228540946 |z (OCoLC)1249236562 |z (OCoLC)1252404187 |z (OCoLC)1257346544 |z (OCoLC)1257376248 |z (OCoLC)1289811714 | ||
042 | |a pcc |a dlr | ||
043 | |a n-us--- | ||
050 | 4 | |a TK5102.94 |b .C78 1996b | |
072 | 7 | |a TEC |x 041000 |2 bisacsh | |
082 | 7 | |a 005.82 |b Cry | |
084 | |a 54.62 |2 bcl | ||
049 | |a MAIN | ||
245 | 0 | 0 | |a Cryptography's role in securing the information society / |c Kenneth W. Dam and Herbert S. Lin, editors. |
260 | |a Washington, DC : |b National Academy Press, |c 1996. | ||
300 | |a 1 online resource (xxx, 688 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
500 | |a "Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council." | ||
504 | |a Includes bibliographical references and index. | ||
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [S.l.] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
588 | 0 | |a Print version record. | |
505 | 0 | 0 | |g Machine generated contents note: |g 1. |t Growing Vulnerability in the Information Age -- |g 2. |t Cryptography: Roles, Market, and Infrastructure -- |g 3. |t Needs for Access to Encrypted Information -- |g 4. |t Export Controls -- |g 5. |t Escrowed Encryption and Related Issues -- |g 6. |t Other Dimensions of National Cryptography Policy -- |g 7. |t Policy Options for the Future -- |g 8. |t Synthesis, Findings, and Recommendations -- |g App. |t A Contributors to the NRC Project on National Cryptography Policy -- |g App. C |t Brief Primer on Cryptography -- |g App. D |t Overview of Electronic Surveillance: History and Current Status -- |g App. E |t Brief History of Cryptography Policy -- |g App. F |t Brief Primer on Intelligence -- |g App. G |t International Scope of Cryptography Policy -- |g App. H |t Summary of Important Requirements for a Public-Key Infrastructure -- |g App. I |t Industry-Specific Dimensions of Security -- |g App. J |t Examples of Risks Posed by Unprotected Information -- |g App. K |t Cryptographic Applications Programming Interfaces -- |g App. L |t Other Looming Issues Related to Cryptography Policy -- |g App. M |t Federal Information Processing Standards -- |g App. N |t Laws, Regulations, and Documents Relevant to Cryptography. |
520 | |a "For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions." "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket. | ||
650 | 0 | |a Telecommunication systems |x Security measures |x Government policy |z United States. | |
650 | 0 | |a Cryptography. | |
650 | 6 | |a Systèmes de télécommunications |x Sécurité |x Mesures |x Politique gouvernementale |z États-Unis. | |
650 | 6 | |a Cryptographie. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Telecommunications. |2 bisacsh | |
650 | 7 | |a Cryptography |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
650 | 1 | 7 | |a Geheimschrift. |2 gtt |
650 | 1 | 7 | |a Informatiemaatschappij. |2 gtt |
650 | 1 | 7 | |a Beveiliging. |2 gtt |
650 | 7 | |a Cryptographie. |2 ram | |
650 | 7 | |a Systèmes de télécommunications. |2 ram | |
700 | 1 | |a Dam, Kenneth W. |1 http://isni.org/isni/0000000383011452 |0 http://id.loc.gov/authorities/names/n50038986 | |
700 | 1 | |a Lin, Herbert. |0 http://id.loc.gov/authorities/names/n86039872 | |
710 | 2 | |a National Research Council (U.S.). |b Committee to Study National Cryptography Policy. |0 http://id.loc.gov/authorities/names/no96066835 | |
758 | |i has work: |a Cryptography's role in securing the information society (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGkDTHyQVRw8qwVpw9F3Qq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Cryptography's role in securing the information society. |d Washington, DC : National Academy Press, 1996 |w (DLC) 96068943 |w (OCoLC)34932315 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=899 |3 Volltext |
938 | |a Internet Archive |b INAR |n cryptographysrol0000unse | ||
938 | |a ebrary |b EBRY |n ebr10041132 | ||
938 | |a EBSCOhost |b EBSC |n 899 | ||
938 | |a YBP Library Services |b YANK |n 2302933 | ||
938 | |a YBP Library Services |b YANK |n 6011728 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH36566273 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm57135909 |
---|---|
_version_ | 1816881621833351169 |
adam_text | |
any_adam_object | |
author2 | Dam, Kenneth W. Lin, Herbert |
author2_role | |
author2_variant | k w d kw kwd h l hl |
author_GND | http://id.loc.gov/authorities/names/n50038986 http://id.loc.gov/authorities/names/n86039872 |
author_corporate | National Research Council (U.S.). Committee to Study National Cryptography Policy |
author_corporate_role | |
author_facet | Dam, Kenneth W. Lin, Herbert National Research Council (U.S.). Committee to Study National Cryptography Policy |
author_sort | Dam, Kenneth W. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5102 |
callnumber-raw | TK5102.94 .C78 1996b |
callnumber-search | TK5102.94 .C78 1996b |
callnumber-sort | TK 45102.94 C78 41996B |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Growing Vulnerability in the Information Age -- Cryptography: Roles, Market, and Infrastructure -- Needs for Access to Encrypted Information -- Export Controls -- Escrowed Encryption and Related Issues -- Other Dimensions of National Cryptography Policy -- Policy Options for the Future -- Synthesis, Findings, and Recommendations -- A Contributors to the NRC Project on National Cryptography Policy -- Brief Primer on Cryptography -- Overview of Electronic Surveillance: History and Current Status -- Brief History of Cryptography Policy -- Brief Primer on Intelligence -- International Scope of Cryptography Policy -- Summary of Important Requirements for a Public-Key Infrastructure -- Industry-Specific Dimensions of Security -- Examples of Risks Posed by Unprotected Information -- Cryptographic Applications Programming Interfaces -- Other Looming Issues Related to Cryptography Policy -- Federal Information Processing Standards -- Laws, Regulations, and Documents Relevant to Cryptography. |
ctrlnum | (OCoLC)57135909 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08465cam a2200829 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm57135909 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">041202s1996 dcu ob 001 0 eng c</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 96068943 </subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">BUF</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">BUF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">TUU</subfield><subfield code="d">TNF</subfield><subfield code="d">OCLCE</subfield><subfield code="d">E7B</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">CUS</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ORU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">P4I</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UV0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LOA</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MWM</subfield><subfield code="d">INTCL</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">SUR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">LUE</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">EZ9</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CGU</subfield><subfield code="d">WYU</subfield><subfield code="d">GDC</subfield><subfield code="d">JZ6</subfield><subfield code="d">U3G</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">UKCRE</subfield><subfield code="d">PTL</subfield><subfield code="d">INARC</subfield><subfield code="d">AJS</subfield><subfield code="d">CNNOR</subfield><subfield code="d">REDDC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">42329133</subfield><subfield code="a">70731958</subfield><subfield code="a">559169226</subfield><subfield code="a">605360316</subfield><subfield code="a">609921600</subfield><subfield code="a">722182832</subfield><subfield code="a">728007004</subfield><subfield code="a">960204598</subfield><subfield code="a">961627880</subfield><subfield code="a">961690383</subfield><subfield code="a">962680477</subfield><subfield code="a">962713828</subfield><subfield code="a">970764976</subfield><subfield code="a">975242829</subfield><subfield code="a">975300529</subfield><subfield code="a">984856734</subfield><subfield code="a">988498271</subfield><subfield code="a">991917235</subfield><subfield code="a">1017612828</subfield><subfield code="a">1018005929</subfield><subfield code="a">1037929114</subfield><subfield code="a">1038632966</subfield><subfield code="a">1044642364</subfield><subfield code="a">1045382579</subfield><subfield code="a">1045386768</subfield><subfield code="a">1047527262</subfield><subfield code="a">1048244205</subfield><subfield code="a">1048751309</subfield><subfield code="a">1055338167</subfield><subfield code="a">1064119694</subfield><subfield code="a">1065752406</subfield><subfield code="a">1081056751</subfield><subfield code="a">1081271208</subfield><subfield code="a">1086971066</subfield><subfield code="a">1153542731</subfield><subfield code="a">1156337747</subfield><subfield code="a">1162448084</subfield><subfield code="a">1182011549</subfield><subfield code="a">1188979714</subfield><subfield code="a">1196972512</subfield><subfield code="a">1228540946</subfield><subfield code="a">1249236562</subfield><subfield code="a">1252404187</subfield><subfield code="a">1257346544</subfield><subfield code="a">1257376248</subfield><subfield code="a">1289811714</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309054753</subfield><subfield code="q">(Online version)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309054751</subfield><subfield code="q">(Online version)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585025258</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585025254</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309522540</subfield><subfield code="q">(pdf)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309522544</subfield><subfield code="q">(pdf)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0305054753</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309175807</subfield><subfield code="q">(e-book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309175801</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)57135909</subfield><subfield code="z">(OCoLC)42329133</subfield><subfield code="z">(OCoLC)70731958</subfield><subfield code="z">(OCoLC)559169226</subfield><subfield code="z">(OCoLC)605360316</subfield><subfield code="z">(OCoLC)609921600</subfield><subfield code="z">(OCoLC)722182832</subfield><subfield code="z">(OCoLC)728007004</subfield><subfield code="z">(OCoLC)960204598</subfield><subfield code="z">(OCoLC)961627880</subfield><subfield code="z">(OCoLC)961690383</subfield><subfield code="z">(OCoLC)962680477</subfield><subfield code="z">(OCoLC)962713828</subfield><subfield code="z">(OCoLC)970764976</subfield><subfield code="z">(OCoLC)975242829</subfield><subfield code="z">(OCoLC)975300529</subfield><subfield code="z">(OCoLC)984856734</subfield><subfield code="z">(OCoLC)988498271</subfield><subfield code="z">(OCoLC)991917235</subfield><subfield code="z">(OCoLC)1017612828</subfield><subfield code="z">(OCoLC)1018005929</subfield><subfield code="z">(OCoLC)1037929114</subfield><subfield code="z">(OCoLC)1038632966</subfield><subfield code="z">(OCoLC)1044642364</subfield><subfield code="z">(OCoLC)1045382579</subfield><subfield code="z">(OCoLC)1045386768</subfield><subfield code="z">(OCoLC)1047527262</subfield><subfield code="z">(OCoLC)1048244205</subfield><subfield code="z">(OCoLC)1048751309</subfield><subfield code="z">(OCoLC)1055338167</subfield><subfield code="z">(OCoLC)1064119694</subfield><subfield code="z">(OCoLC)1065752406</subfield><subfield code="z">(OCoLC)1081056751</subfield><subfield code="z">(OCoLC)1081271208</subfield><subfield code="z">(OCoLC)1086971066</subfield><subfield code="z">(OCoLC)1153542731</subfield><subfield code="z">(OCoLC)1156337747</subfield><subfield code="z">(OCoLC)1162448084</subfield><subfield code="z">(OCoLC)1182011549</subfield><subfield code="z">(OCoLC)1188979714</subfield><subfield code="z">(OCoLC)1196972512</subfield><subfield code="z">(OCoLC)1228540946</subfield><subfield code="z">(OCoLC)1249236562</subfield><subfield code="z">(OCoLC)1252404187</subfield><subfield code="z">(OCoLC)1257346544</subfield><subfield code="z">(OCoLC)1257376248</subfield><subfield code="z">(OCoLC)1289811714</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">pcc</subfield><subfield code="a">dlr</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5102.94</subfield><subfield code="b">.C78 1996b</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">041000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.82</subfield><subfield code="b">Cry</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.62</subfield><subfield code="2">bcl</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cryptography's role in securing the information society /</subfield><subfield code="c">Kenneth W. Dam and Herbert S. Lin, editors.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Washington, DC :</subfield><subfield code="b">National Academy Press,</subfield><subfield code="c">1996.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxx, 688 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[S.l.] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="g">Machine generated contents note:</subfield><subfield code="g">1.</subfield><subfield code="t">Growing Vulnerability in the Information Age --</subfield><subfield code="g">2.</subfield><subfield code="t">Cryptography: Roles, Market, and Infrastructure --</subfield><subfield code="g">3.</subfield><subfield code="t">Needs for Access to Encrypted Information --</subfield><subfield code="g">4.</subfield><subfield code="t">Export Controls --</subfield><subfield code="g">5.</subfield><subfield code="t">Escrowed Encryption and Related Issues --</subfield><subfield code="g">6.</subfield><subfield code="t">Other Dimensions of National Cryptography Policy --</subfield><subfield code="g">7.</subfield><subfield code="t">Policy Options for the Future --</subfield><subfield code="g">8.</subfield><subfield code="t">Synthesis, Findings, and Recommendations --</subfield><subfield code="g">App.</subfield><subfield code="t">A Contributors to the NRC Project on National Cryptography Policy --</subfield><subfield code="g">App. C</subfield><subfield code="t">Brief Primer on Cryptography --</subfield><subfield code="g">App. D</subfield><subfield code="t">Overview of Electronic Surveillance: History and Current Status --</subfield><subfield code="g">App. E</subfield><subfield code="t">Brief History of Cryptography Policy --</subfield><subfield code="g">App. F</subfield><subfield code="t">Brief Primer on Intelligence --</subfield><subfield code="g">App. G</subfield><subfield code="t">International Scope of Cryptography Policy --</subfield><subfield code="g">App. H</subfield><subfield code="t">Summary of Important Requirements for a Public-Key Infrastructure --</subfield><subfield code="g">App. I</subfield><subfield code="t">Industry-Specific Dimensions of Security --</subfield><subfield code="g">App. J</subfield><subfield code="t">Examples of Risks Posed by Unprotected Information --</subfield><subfield code="g">App. K</subfield><subfield code="t">Cryptographic Applications Programming Interfaces --</subfield><subfield code="g">App. L</subfield><subfield code="t">Other Looming Issues Related to Cryptography Policy --</subfield><subfield code="g">App. M</subfield><subfield code="t">Federal Information Processing Standards --</subfield><subfield code="g">App. N</subfield><subfield code="t">Laws, Regulations, and Documents Relevant to Cryptography.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions." "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Telecommunication systems</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes de télécommunications</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Politique gouvernementale</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Telecommunications.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Geheimschrift.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Informatiemaatschappij.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Beveiliging.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie.</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes de télécommunications.</subfield><subfield code="2">ram</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dam, Kenneth W.</subfield><subfield code="1">http://isni.org/isni/0000000383011452</subfield><subfield code="0">http://id.loc.gov/authorities/names/n50038986</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Herbert.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n86039872</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.).</subfield><subfield code="b">Committee to Study National Cryptography Policy.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no96066835</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cryptography's role in securing the information society (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGkDTHyQVRw8qwVpw9F3Qq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Cryptography's role in securing the information society.</subfield><subfield code="d">Washington, DC : National Academy Press, 1996</subfield><subfield code="w">(DLC) 96068943</subfield><subfield code="w">(OCoLC)34932315</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=899</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">cryptographysrol0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10041132</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">899</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2302933</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">6011728</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36566273</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-ocm57135909 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:38Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no96066835 |
isbn | 0309054753 9780309054751 0585025258 9780585025254 9780309522540 0309522544 9780309175807 0309175801 |
language | English |
lccn | 96068943 |
oclc_num | 57135909 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxx, 688 pages) |
psigel | ZDB-4-EBA |
publishDate | 1996 |
publishDateSearch | 1996 |
publishDateSort | 1996 |
publisher | National Academy Press, |
record_format | marc |
spelling | Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors. Washington, DC : National Academy Press, 1996. 1 online resource (xxx, 688 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda "Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council." Includes bibliographical references and index. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Print version record. Machine generated contents note: 1. Growing Vulnerability in the Information Age -- 2. Cryptography: Roles, Market, and Infrastructure -- 3. Needs for Access to Encrypted Information -- 4. Export Controls -- 5. Escrowed Encryption and Related Issues -- 6. Other Dimensions of National Cryptography Policy -- 7. Policy Options for the Future -- 8. Synthesis, Findings, and Recommendations -- App. A Contributors to the NRC Project on National Cryptography Policy -- App. C Brief Primer on Cryptography -- App. D Overview of Electronic Surveillance: History and Current Status -- App. E Brief History of Cryptography Policy -- App. F Brief Primer on Intelligence -- App. G International Scope of Cryptography Policy -- App. H Summary of Important Requirements for a Public-Key Infrastructure -- App. I Industry-Specific Dimensions of Security -- App. J Examples of Risks Posed by Unprotected Information -- App. K Cryptographic Applications Programming Interfaces -- App. L Other Looming Issues Related to Cryptography Policy -- App. M Federal Information Processing Standards -- App. N Laws, Regulations, and Documents Relevant to Cryptography. "For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions." "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket. Telecommunication systems Security measures Government policy United States. Cryptography. Systèmes de télécommunications Sécurité Mesures Politique gouvernementale États-Unis. Cryptographie. TECHNOLOGY & ENGINEERING Telecommunications. bisacsh Cryptography fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Geheimschrift. gtt Informatiemaatschappij. gtt Beveiliging. gtt Cryptographie. ram Systèmes de télécommunications. ram Dam, Kenneth W. http://isni.org/isni/0000000383011452 http://id.loc.gov/authorities/names/n50038986 Lin, Herbert. http://id.loc.gov/authorities/names/n86039872 National Research Council (U.S.). Committee to Study National Cryptography Policy. http://id.loc.gov/authorities/names/no96066835 has work: Cryptography's role in securing the information society (Text) https://id.oclc.org/worldcat/entity/E39PCGkDTHyQVRw8qwVpw9F3Qq https://id.oclc.org/worldcat/ontology/hasWork Print version: Cryptography's role in securing the information society. Washington, DC : National Academy Press, 1996 (DLC) 96068943 (OCoLC)34932315 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=899 Volltext |
spellingShingle | Cryptography's role in securing the information society / Growing Vulnerability in the Information Age -- Cryptography: Roles, Market, and Infrastructure -- Needs for Access to Encrypted Information -- Export Controls -- Escrowed Encryption and Related Issues -- Other Dimensions of National Cryptography Policy -- Policy Options for the Future -- Synthesis, Findings, and Recommendations -- A Contributors to the NRC Project on National Cryptography Policy -- Brief Primer on Cryptography -- Overview of Electronic Surveillance: History and Current Status -- Brief History of Cryptography Policy -- Brief Primer on Intelligence -- International Scope of Cryptography Policy -- Summary of Important Requirements for a Public-Key Infrastructure -- Industry-Specific Dimensions of Security -- Examples of Risks Posed by Unprotected Information -- Cryptographic Applications Programming Interfaces -- Other Looming Issues Related to Cryptography Policy -- Federal Information Processing Standards -- Laws, Regulations, and Documents Relevant to Cryptography. Telecommunication systems Security measures Government policy United States. Cryptography. Systèmes de télécommunications Sécurité Mesures Politique gouvernementale États-Unis. Cryptographie. TECHNOLOGY & ENGINEERING Telecommunications. bisacsh Cryptography fast Geheimschrift. gtt Informatiemaatschappij. gtt Beveiliging. gtt Cryptographie. ram Systèmes de télécommunications. ram |
title | Cryptography's role in securing the information society / |
title_alt | Growing Vulnerability in the Information Age -- Cryptography: Roles, Market, and Infrastructure -- Needs for Access to Encrypted Information -- Export Controls -- Escrowed Encryption and Related Issues -- Other Dimensions of National Cryptography Policy -- Policy Options for the Future -- Synthesis, Findings, and Recommendations -- A Contributors to the NRC Project on National Cryptography Policy -- Brief Primer on Cryptography -- Overview of Electronic Surveillance: History and Current Status -- Brief History of Cryptography Policy -- Brief Primer on Intelligence -- International Scope of Cryptography Policy -- Summary of Important Requirements for a Public-Key Infrastructure -- Industry-Specific Dimensions of Security -- Examples of Risks Posed by Unprotected Information -- Cryptographic Applications Programming Interfaces -- Other Looming Issues Related to Cryptography Policy -- Federal Information Processing Standards -- Laws, Regulations, and Documents Relevant to Cryptography. |
title_auth | Cryptography's role in securing the information society / |
title_exact_search | Cryptography's role in securing the information society / |
title_full | Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors. |
title_fullStr | Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors. |
title_full_unstemmed | Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors. |
title_short | Cryptography's role in securing the information society / |
title_sort | cryptography s role in securing the information society |
topic | Telecommunication systems Security measures Government policy United States. Cryptography. Systèmes de télécommunications Sécurité Mesures Politique gouvernementale États-Unis. Cryptographie. TECHNOLOGY & ENGINEERING Telecommunications. bisacsh Cryptography fast Geheimschrift. gtt Informatiemaatschappij. gtt Beveiliging. gtt Cryptographie. ram Systèmes de télécommunications. ram |
topic_facet | Telecommunication systems Security measures Government policy United States. Cryptography. Systèmes de télécommunications Sécurité Mesures Politique gouvernementale États-Unis. Cryptographie. TECHNOLOGY & ENGINEERING Telecommunications. Cryptography United States Geheimschrift. Informatiemaatschappij. Beveiliging. Systèmes de télécommunications. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=899 |
work_keys_str_mv | AT damkennethw cryptographysroleinsecuringtheinformationsociety AT linherbert cryptographysroleinsecuringtheinformationsociety AT nationalresearchcounciluscommitteetostudynationalcryptographypolicy cryptographysroleinsecuringtheinformationsociety |