|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn923258311 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
151010s1900 dcu o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d MERUC
|d OCLCQ
|d ZCU
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d LVT
|d DKC
|d AU@
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
020 |
|
|
|a 9780309522540
|
020 |
|
|
|a 0309522544
|
029 |
1 |
|
|a DEBBG
|b BV044106423
|
035 |
|
|
|a (OCoLC)923258311
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a TK5102.94
|
082 |
0 |
4 |
|a 652.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dam, Kenneth W.
|
245 |
1 |
0 |
|a Cryptography's Role in Securing the Information Society.
|
260 |
|
|
|a Washington :
|b National Academies Press,
|c 1900.
|
300 |
|
|
|a 1 online resource (720 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a ""Front Matter""; ""Preface""; ""Contents""; ""Executive Summary""; ""PART I Framing the Policy Issues""; ""1 Growing Vulnerability in the Information Age""; ""2 Cryptography: Roles, Market, and Infrastructure""; ""3 Needs for Access to Encrypted Information""; ""4 Export Controls""; ""5 Escrowed Encryption and Related Issues""; ""6 Other Dimensions of National Cryptography Policy""; ""PART III Policy Options, Findings, and Recommendations""; ""7 Policy Options for the Future""; ""8 Synthesis, Findings, and Recommendations""
|
505 |
8 |
|
|a ""A Contributors to the NRC Project on National Cryptography Policy""""B Glossary""; ""C A Brief Primer on Cryptography""; ""D An Overview of Electronic Surveillance: History and Current Status""; ""E A Brief History of Cryptography Policy""; ""F A Brief Primer on Intelligence""; ""G The International Scope of Cryptography Policy""; ""H Summary of Important Requirements for a Public-Key Infrastructure""; ""I Industry-Specific Dimensions of Security""; ""J Examples of Risks Posed by Unprotected Information""; ""K Cryptographic Applications Programming Interfaces""
|
505 |
8 |
|
|a ""L Other Looming Issues Related to Cryptography Policy""""M Federal Information Processing Standards""; ""N Laws, Documents, and Regulations, Relevant to Cryptography""; ""Index""
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Telecommunication systems
|x Security measures
|x Government policy
|z United States.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
6 |
|a Systèmes de télécommunications
|x Sécurité
|x Mesures
|x Politique gouvernementale
|z États-Unis.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
7 |
|a Cryptography
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq
|
700 |
1 |
|
|a Lin, Herbert S.
|
700 |
1 |
|
|a Staff, National Research Council.
|
758 |
|
|
|i has work:
|a Cryptography's role in securing the information society (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGkDTHyQVRw8qwVpw9F3Qq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Dam, Kenneth W.
|t Cryptography's Role in Securing the Information Society.
|d Washington : National Academies Press, ©1900
|z 9780309054751
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=3375712
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3375712
|
994 |
|
|
|a 92
|b IZTAP
|