Cargando…

Cryptography's role in securing the information society /

"For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: National Research Council (U.S.). Committee to Study National Cryptography Policy
Otros Autores: Dam, Kenneth W., Lin, Herbert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, DC : National Academy Press, 1996.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm57135909
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 041202s1996 dcu ob 001 0 eng c
010 |a  96068943  
040 |a BUF  |b eng  |e pn  |c BUF  |d OCLCQ  |d N$T  |d YDXCP  |d TUU  |d TNF  |d OCLCE  |d E7B  |d MERUC  |d CCO  |d CUS  |d FVL  |d OCLCQ  |d ORU  |d OCLCQ  |d ZCU  |d P4I  |d OCLCQ  |d DKDLA  |d OCLCQ  |d UV0  |d OCLCQ  |d LOA  |d AZK  |d OCLCQ  |d MWM  |d INTCL  |d COCUF  |d AGLDB  |d SUR  |d MOR  |d PIFBR  |d OCLCA  |d OCLCQ  |d U3W  |d LUE  |d OCLCF  |d STF  |d WRM  |d OCLCQ  |d VTS  |d NRAMU  |d EZ9  |d VT2  |d OCLCQ  |d CGU  |d WYU  |d GDC  |d JZ6  |d U3G  |d M8D  |d UKAHL  |d UKCRE  |d PTL  |d INARC  |d AJS  |d CNNOR  |d REDDC  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ  |d OCLCO 
019 |a 42329133  |a 70731958  |a 559169226  |a 605360316  |a 609921600  |a 722182832  |a 728007004  |a 960204598  |a 961627880  |a 961690383  |a 962680477  |a 962713828  |a 970764976  |a 975242829  |a 975300529  |a 984856734  |a 988498271  |a 991917235  |a 1017612828  |a 1018005929  |a 1037929114  |a 1038632966  |a 1044642364  |a 1045382579  |a 1045386768  |a 1047527262  |a 1048244205  |a 1048751309  |a 1055338167  |a 1064119694  |a 1065752406  |a 1081056751  |a 1081271208  |a 1086971066  |a 1153542731  |a 1156337747  |a 1162448084  |a 1182011549  |a 1188979714  |a 1196972512  |a 1228540946  |a 1249236562  |a 1252404187  |a 1257346544  |a 1257376248  |a 1289811714 
020 |a 0309054753  |q (Online version) 
020 |a 9780309054751  |q (Online version) 
020 |a 0585025258  |q (electronic bk.) 
020 |a 9780585025254  |q (electronic bk.) 
020 |a 9780309522540  |q (pdf) 
020 |a 0309522544  |q (pdf) 
020 |z 0305054753 
020 |a 9780309175807  |q (e-book) 
020 |a 0309175801 
029 1 |a AU@  |b 000051472548 
029 1 |a DEBBG  |b BV043140104 
029 1 |a DEBSZ  |b 422620254 
029 1 |a GBVCP  |b 801221390 
029 1 |a NZ1  |b 11921487 
029 1 |a NZ1  |b 16051410 
035 |a (OCoLC)57135909  |z (OCoLC)42329133  |z (OCoLC)70731958  |z (OCoLC)559169226  |z (OCoLC)605360316  |z (OCoLC)609921600  |z (OCoLC)722182832  |z (OCoLC)728007004  |z (OCoLC)960204598  |z (OCoLC)961627880  |z (OCoLC)961690383  |z (OCoLC)962680477  |z (OCoLC)962713828  |z (OCoLC)970764976  |z (OCoLC)975242829  |z (OCoLC)975300529  |z (OCoLC)984856734  |z (OCoLC)988498271  |z (OCoLC)991917235  |z (OCoLC)1017612828  |z (OCoLC)1018005929  |z (OCoLC)1037929114  |z (OCoLC)1038632966  |z (OCoLC)1044642364  |z (OCoLC)1045382579  |z (OCoLC)1045386768  |z (OCoLC)1047527262  |z (OCoLC)1048244205  |z (OCoLC)1048751309  |z (OCoLC)1055338167  |z (OCoLC)1064119694  |z (OCoLC)1065752406  |z (OCoLC)1081056751  |z (OCoLC)1081271208  |z (OCoLC)1086971066  |z (OCoLC)1153542731  |z (OCoLC)1156337747  |z (OCoLC)1162448084  |z (OCoLC)1182011549  |z (OCoLC)1188979714  |z (OCoLC)1196972512  |z (OCoLC)1228540946  |z (OCoLC)1249236562  |z (OCoLC)1252404187  |z (OCoLC)1257346544  |z (OCoLC)1257376248  |z (OCoLC)1289811714 
042 |a pcc  |a dlr 
043 |a n-us--- 
050 4 |a TK5102.94  |b .C78 1996b 
072 7 |a TEC  |x 041000  |2 bisacsh 
082 0 4 |a 005.82  |b Cry 
084 |a 54.62  |2 bcl 
049 |a UAMI 
245 0 0 |a Cryptography's role in securing the information society /  |c Kenneth W. Dam and Herbert S. Lin, editors. 
260 |a Washington, DC :  |b National Academy Press,  |c 1996. 
300 |a 1 online resource (xxx, 688 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
500 |a "Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council." 
504 |a Includes bibliographical references and index. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [S.l.] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
588 0 |a Print version record. 
505 0 0 |g Machine generated contents note:  |g 1.  |t Growing Vulnerability in the Information Age --  |g 2.  |t Cryptography: Roles, Market, and Infrastructure --  |g 3.  |t Needs for Access to Encrypted Information --  |g 4.  |t Export Controls --  |g 5.  |t Escrowed Encryption and Related Issues --  |g 6.  |t Other Dimensions of National Cryptography Policy --  |g 7.  |t Policy Options for the Future --  |g 8.  |t Synthesis, Findings, and Recommendations --  |g App.  |t A Contributors to the NRC Project on National Cryptography Policy --  |g App. C  |t Brief Primer on Cryptography --  |g App. D  |t Overview of Electronic Surveillance: History and Current Status --  |g App. E  |t Brief History of Cryptography Policy --  |g App. F  |t Brief Primer on Intelligence --  |g App. G  |t International Scope of Cryptography Policy --  |g App. H  |t Summary of Important Requirements for a Public-Key Infrastructure --  |g App. I  |t Industry-Specific Dimensions of Security --  |g App. J  |t Examples of Risks Posed by Unprotected Information --  |g App. K  |t Cryptographic Applications Programming Interfaces --  |g App. L  |t Other Looming Issues Related to Cryptography Policy --  |g App. M  |t Federal Information Processing Standards --  |g App. N  |t Laws, Regulations, and Documents Relevant to Cryptography. 
520 |a "For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions." "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Telecommunication systems  |x Security measures  |x Government policy  |z United States. 
650 0 |a Cryptography. 
650 6 |a Systèmes de télécommunications  |x Sécurité  |x Mesures  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Cryptographie. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Telecommunications.  |2 bisacsh 
650 7 |a Cryptography  |2 fast 
651 7 |a United States  |2 fast 
650 1 7 |a Geheimschrift.  |2 gtt 
650 1 7 |a Informatiemaatschappij.  |2 gtt 
650 1 7 |a Beveiliging.  |2 gtt 
650 7 |a Cryptographie.  |2 ram 
650 7 |a Systèmes de télécommunications.  |2 ram 
700 1 |a Dam, Kenneth W.  |1 http://isni.org/isni/0000000383011452 
700 1 |a Lin, Herbert. 
710 2 |a National Research Council (U.S.).  |b Committee to Study National Cryptography Policy. 
776 0 8 |i Print version:  |t Cryptography's role in securing the information society.  |d Washington, DC : National Academy Press, 1996  |w (DLC) 96068943  |w (OCoLC)34932315 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=899  |z Texto completo 
938 |a Internet Archive  |b INAR  |n cryptographysrol0000unse 
938 |a ebrary  |b EBRY  |n ebr10041132 
938 |a EBSCOhost  |b EBSC  |n 899 
938 |a YBP Library Services  |b YANK  |n 2302933 
938 |a YBP Library Services  |b YANK  |n 6011728 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36566273 
994 |a 92  |b IZTAP