|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm49852722 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
020507s2001 maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d EXW
|d OCLCQ
|d TUU
|d OCLCQ
|d TNF
|d MERUC
|d OCLCQ
|d OCLCF
|d NLGGC
|d OCLCO
|d OCLCQ
|d YDXCP
|d OCLCQ
|d MWM
|d AGLDB
|d OCLCQ
|d SAV
|d JBG
|d QT7
|d OCLCA
|d LUE
|d VTS
|d OCLCQ
|d INT
|d TOF
|d CUY
|d OCLCQ
|d STF
|d UKAHL
|d K6U
|d UMK
|d UKEHC
|d IEEEE
|d OCLCO
|d OCLCQ
|d IOY
|d OCLCQ
|
019 |
|
|
|a 533449168
|a 702097688
|a 961595990
|a 962714435
|a 970727919
|a 1007391870
|a 1053051475
|a 1109175795
|a 1200086401
|
020 |
|
|
|a 1580534082
|q (electronic bk.)
|
020 |
|
|
|a 9781580534086
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000051412353
|
029 |
1 |
|
|a DEBBG
|b BV043119419
|
029 |
1 |
|
|a DEBSZ
|b 422472093
|
029 |
1 |
|
|a GBVCP
|b 800854284
|
035 |
|
|
|a (OCoLC)49852722
|z (OCoLC)533449168
|z (OCoLC)702097688
|z (OCoLC)961595990
|z (OCoLC)962714435
|z (OCoLC)970727919
|z (OCoLC)1007391870
|z (OCoLC)1053051475
|z (OCoLC)1109175795
|z (OCoLC)1200086401
|
050 |
|
4 |
|a TK7895.S62
|b .H46 2001eb
|
072 |
|
7 |
|a COM
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 006
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hendry, Mike.
|
245 |
1 |
0 |
|a Smart card security and applications /
|c Mike Hendry.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Boston :
|b Artech House,
|c ©2001.
|
300 |
|
|
|a 1 online resource (xviii, 305 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Artech House telecommunications library
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t The march of the card --
|t What is a chip card? --
|t Systems and procedures --
|t Market issues --
|t Problem Definition --
|t Perceptions --
|t ... and reality --
|t Calculating the risks: probabilities and odds --
|t Technical communication obstacles --
|t Specifying the Requirements --
|t Security criteria --
|t Quantifying the threat --
|t Standards --
|t Documenting the specification --
|t Technology --
|t Card Technology --
|t Visual features --
|t Magnetic stripe --
|t Enhancing security using complementary technologies --
|t Optical --
|t Smart cards --
|t Hybrids --
|t PCMCIA cards --
|t Others --
|t Encryption --
|t Cryptology overview and terminology --
|t Algorithms --
|t Keys --
|t Key management --
|t Public key infrastructures --
|t Computational requirements --
|t Cryptography export controls --
|t Passwords and Biometrics --
|t Personal identification types --
|t Requirements --
|t Components --
|t Passwords and PINs --
|t Behavioral --
|t Physiometric --
|t Biometrics and cards --
|t Chip Card Types and Characteristics --
|t Memory cards --
|t Microprocessor cards --
|t Contact and contactless --
|t Form factors --
|t Chip Card Security Features --
|t Carrier --
|t External security features --
|t Chip --
|t Contacts --
|t Antenna --
|t Mask --
|t Attacks and countermeasures --
|t Reliability factors --
|t Sample card specifications --
|t Multiapplication Operating Systems --
|t Functions --
|t Products --
|t System Components --
|t Reader --
|t Terminal --
|t Network --
|t Host systems --
|t Processes and Procedures --
|t Chip design --
|t Manufacture --
|t Personalization --
|t Issuance --
|t Loading/validation --
|t Use --
|t Lost, stolen, and misused cards.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This extensively updated, second edition offers the reader a current overview of the ways smart cards address the computer security issues of today's distributed applications.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Smart cards
|x Security measures.
|
650 |
|
6 |
|a Cartes à mémoire
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Smart cards
|x Security measures.
|2 fast
|0 (OCoLC)fst01121550
|
776 |
0 |
8 |
|i Print version:
|a Hendry, Mike.
|t Smart card security and applications.
|b 2nd ed.
|d Boston : Artech House, ©2001
|z 1580531563
|w (DLC) 2001018808
|
830 |
|
0 |
|a Artech House telecommunications library.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=67425
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH20049972
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 67425
|
938 |
|
|
|a IEEE
|b IEEE
|n 9100018
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2358594
|
994 |
|
|
|a 92
|b IZTAP
|