|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn437145937 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr mn|---||||| |
008 |
090817s2004 xx o 000 0 eng d |
040 |
|
|
|a MERUC
|b eng
|e pn
|c MERUC
|d OCLCQ
|d EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d DKC
|d UMR
|d OCLCQ
|d UMR
|d OCLCO
|d OCLCQ
|d STF
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1388674542
|
020 |
|
|
|a 9781580539562
|q (electronic bk.)
|
020 |
|
|
|a 1580539564
|q (electronic bk.)
|
020 |
|
|
|a 9781580535304
|q (print)
|
020 |
|
|
|a 1580535305
|
029 |
1 |
|
|a AU@
|b 000055638747
|
029 |
1 |
|
|a DEBBG
|b BV044080338
|
029 |
1 |
|
|a DEBSZ
|b 396064108
|
029 |
1 |
|
|a DEBSZ
|b 456412743
|
035 |
|
|
|a (OCoLC)437145937
|z (OCoLC)1388674542
|
050 |
|
4 |
|a QA76.9.A25 D465 2005eb
|
072 |
|
0 |
|a COM053000
|
082 |
0 |
4 |
|a 005.82
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dent, Alexander W.
|
245 |
1 |
0 |
|a User's Guide tp Crytography and Standards.
|
260 |
|
|
|a Norwood :
|b Artech House,
|c 2004.
|
300 |
|
|
|a 1 online resource (398 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Users Guide to Cryptography and Standards; Contents; Acknowledgements; 1 Introduction; 2 Standard and the Standardization Process; 3 Security Mechanism and Security Services; 4 Encryption; 5 Modes of Operation for Block Ciphers; 6 Cryptographic Hash Functions; 7 Message Authentication Codes (MACs); 8 Digital Signatures; 9 Non-Repudiation Mechanisms; 10 Authentication Protocols; 11 Key Management Frameworks; 12 Key Establishment Mechanisms; 13 Public Key Infrastructures; 14 Trusted Third Parties; 15 Cryptographic APIs; 16 Other Standards.; 17 Standards: The Future.
|
505 |
8 |
|
|a Appendix A: Table of StandardsAbout the Authors; Index.
|
520 |
|
|
|a With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized cryptographic techniques to help you protect your data and computing resources to the fullest. Rather than focusing on theory like other books on the market, this unique resource describes cryptography from an end-user perspective, presenting in-dept.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cryptography
|x Standards.
|
650 |
|
0 |
|a Computers
|x Access control
|x Standards.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Cryptographie
|x Normes.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle
|x Normes.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|x Standards
|2 fast
|
650 |
|
7 |
|a Cryptography
|x Standards
|2 fast
|
700 |
1 |
|
|a Mitchell, Chris
|q (Christopher John)
|1 https://id.oclc.org/worldcat/entity/E39PCjF44yrbhxt4YGhvQ3dcdP
|
758 |
|
|
|i has work:
|a User's Guide tp Crytography and Standards (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFFHC8pKgmKrR4jcWTqytX
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
1 |
|
|z 9781580535304
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=227658
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL227658
|
994 |
|
|
|a 92
|b IZTAP
|