|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1266170866 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210830s2020 vaua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d OCLCO
|d UKAHL
|d K6U
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UPM
|d OCLCQ
|d SFB
|d DEGRU
|d OCLCO
|
019 |
|
|
|a 1235959910
|a 1290065039
|a 1373454858
|a 1396858234
|a 1397418781
|
020 |
|
|
|a 9781683925309
|q (electronic bk.)
|
020 |
|
|
|a 1683925300
|q (electronic bk.)
|
020 |
|
|
|a 9781683925293
|q (e-book)
|
020 |
|
|
|a 1683925297
|
020 |
|
|
|z 9781683925316
|
020 |
|
|
|z 1683925319
|
020 |
|
|
|a 1523147288
|
020 |
|
|
|a 9781523147281
|
035 |
|
|
|a (OCoLC)1266170866
|z (OCoLC)1235959910
|z (OCoLC)1290065039
|z (OCoLC)1373454858
|z (OCoLC)1396858234
|z (OCoLC)1397418781
|
050 |
|
4 |
|a TK5105.59
|b .C43 2020eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Chauhan, S. R.,
|e author.
|
245 |
1 |
0 |
|a Computer security and encryption :
|b an introduction /
|c S.R. Chauhan & S. Jangra.
|
264 |
|
1 |
|a Dulles, Virginia :
|b Mercury Learning and Information,
|c [2020]
|
300 |
|
|
|a 1 online resource (xx, 350 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Designed to meet the needs of beginners as well as more advanced readers, this book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. --
|c Edited summary from book.
|
505 |
0 |
0 |
|t Frontmatter --
|t CONTENTS --
|t Preface --
|t Chapter 1: Security Concepts --
|t Chapter 2: Public Key Cryptography and SSL --
|t Chapter 3: World Wide Web Transaction Security --
|t Chapter 4: IP Security and Firewalls --
|t Chapter 5: Public Key Certificates --
|t Chapter 6: Security at the IP Layer --
|t Chapter 7: Remote Access with Internet Protocol Security --
|t Chapter 8: Virtual Private Networks --
|t Chapter 9: The Security of Emerging Technologies --
|t Index
|
590 |
|
|
|a Knovel
|b ACADEMIC - General Engineering & Project Administration
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS / Security / General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Jangra, S.,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Chauhan, S.R.
|t Computer security and encryption.
|d Dulles, Virginia : Mercury Learning and Information, [2020]
|z 9781683925316
|w (DLC) 2020939905
|w (OCoLC)1158580757
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpCSEAI002/toc
|z Texto completo
|
938 |
|
|
|a De Gruyter
|b DEGR
|n 9781683925293
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38151565
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38148617
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2681805
|
994 |
|
|
|a 92
|b IZTAP
|