Handbook of Applied Cryptography / (Record no. 72090)

000 -LEADER
fixed length control field 03771nam a2200565Ii 4500
001 - CONTROL NUMBER
control field 9780429466335
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212745.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190122t20181997fluab ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780429466335(e-book : PDF)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8/2
100 1# - AUTHOR NAME
Author Menezes, Alfred J.,
245 10 - TITLE STATEMENT
Title Handbook of Applied Cryptography /
250 ## - EDITION STATEMENT
Edition statement First edition.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (810 pages) :
490 1# - SERIES STATEMENT
Series statement Discrete Mathematics and Its Applications
520 3# - SUMMARY, ETC.
Summary, etc Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional:It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Access control
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security
-- Cryptography.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Access control.
700 1# - AUTHOR 2
Author 2 Katz, Jonathan,
700 1# - AUTHOR 2
Author 2 van Oorschot, Paul C.,
700 1# - AUTHOR 2
Author 2 Vanstone, Scott A.,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9780429466335
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton, FL :
-- CRC Press,
-- [2018].
264 #4 -
-- ©1997.
336 ## -
-- text
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Security / General.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Operating Systems / General.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography.

No items available.