Handbook of Applied Cryptography / (Record no. 81837)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03771nam a2200565Ii 4500 |
001 - CONTROL NUMBER | |
control field | 9780429466335 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20221107161602.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190122t20181997fluab ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780429466335(e-book : PDF) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)54016134 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | FlBoTFG |
Transcribing agency | FlBoTFG |
Description conventions | rda |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9 |
Item number | .A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | MAT |
Subject category code subdivision | 036000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 046000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | TJFM |
Source | bicscc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/2 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Menezes, Alfred J., |
Relator term | author. |
9 (RLIN) | 66992 |
245 10 - TITLE STATEMENT | |
Title | Handbook of Applied Cryptography / |
Statement of responsibility, etc. | by Alfred J. Menezes, Jonathan Katz, Paul C. van Oorschot and Scott A. Vanstone. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Boca Raton, FL : |
Name of producer, publisher, distributor, manufacturer | CRC Press, |
Date of production, publication, distribution, manufacture, or copyright notice | [2018]. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©1997. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (810 pages) : |
Other physical details | 104 illustrations, text file, PDF. |
336 ## - CONTENT TYPE | |
Content type term | text |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Discrete Mathematics and Its Applications |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
520 3# - SUMMARY, ETC. | |
Summary, etc. | Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional:It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE | |
Additional physical form available note | Also available in print format. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General. |
Source of heading or term | bisacsh |
9 (RLIN) | 6769 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Operating Systems / General. |
Source of heading or term | bisacsh |
9 (RLIN) | 10913 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers |
General subdivision | Access control |
Form subdivision | Handbooks, manuals, etc. |
9 (RLIN) | 19392 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography |
Form subdivision | Handbooks, manuals, etc. |
9 (RLIN) | 19393 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | Cryptography. |
9 (RLIN) | 8524 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers |
General subdivision | Access control. |
9 (RLIN) | 11248 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
9 (RLIN) | 3294 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Katz, Jonathan, |
Relator term | author. |
9 (RLIN) | 66993 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | van Oorschot, Paul C., |
Relator term | author. |
9 (RLIN) | 66994 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Vanstone, Scott A., |
Relator term | author. |
9 (RLIN) | 66995 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | Taylor and Francis. |
9 (RLIN) | 10719 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 9780849385230 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Discrete Mathematics and Its Applications. |
9 (RLIN) | 11386 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9780429466335">https://www.taylorfrancis.com/books/9780429466335</a> |
Public note | Click here to view |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eTextbook |
No items available.