|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm51488281 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
021202s2002 maua ob 001 0 eng d |
040 |
|
|
|a COO
|b eng
|e pn
|c COO
|d OCLCQ
|d OCLCG
|d U5D
|d OCLCQ
|d B24X7
|d OCLCQ
|d LGG
|d OCLCQ
|d UMI
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d OCLCQ
|d CEF
|d UKBTH
|d BRF
|d EYM
|d OCLCO
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 427518750
|a 606019182
|a 824971553
|a 987827267
|a 1179654796
|a 1194730981
|
020 |
|
|
|a 9780080504650
|
020 |
|
|
|a 0080504655
|
020 |
|
|
|z 1558607692
|
020 |
|
|
|z 9781558607699
|
029 |
1 |
|
|a AU@
|b 000050492568
|
029 |
1 |
|
|a DEBBG
|b BV041119970
|
029 |
1 |
|
|a DEBSZ
|b 396678580
|
029 |
1 |
|
|a GBVCP
|b 785366415
|
035 |
|
|
|a (OCoLC)51488281
|z (OCoLC)427518750
|z (OCoLC)606019182
|z (OCoLC)824971553
|z (OCoLC)987827267
|z (OCoLC)1179654796
|z (OCoLC)1194730981
|
037 |
|
|
|a CL0500000183
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .W39 2002b
|
082 |
0 |
4 |
|a 005.8/2
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wayner, Peter,
|d 1964-
|
245 |
1 |
0 |
|a Disappearing cryptography :
|b information hiding : steganography & watermarking /
|c Peter Wayner.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Boston :
|b Morgan Kaufmann Publishers,
|c ©2002.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Framing information -- Encryption -- Error correction -- Secret sharing -- Compression -- Basic mimicry -- Grammars and mimicry -- Parsing the output -- Life in the noise -- Anonymous remailers -- Secret broadcasts -- Keys -- Ordering and reordering -- Spreading -- Synthetic worlds -- Watermarks -- Steganalysis.
|
520 |
|
|
|a Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the best-selling first edition describes a number of different techniques to hide information. These include encryption, making data inc.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Digital watermarking.
|
650 |
|
0 |
|a Internet.
|
650 |
|
2 |
|a Internet
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Tatouage numérique.
|
650 |
|
6 |
|a Internet.
|
650 |
|
7 |
|a digital watermarking.
|2 aat
|
650 |
|
7 |
|a Internet.
|2 aat
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Digital watermarking
|2 fast
|
650 |
|
7 |
|a Internet
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Wayner, Peter, 1964-
|t Disappearing cryptography.
|b 2nd ed.
|d Amsterdam ; Boston : MK/Morgan Kaufmann Publishers, ©2002
|z 1558607692
|w (DLC) 2001099790
|w (OCoLC)49749227
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781558607699/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH23085049
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00002341
|
994 |
|
|
|a 92
|b IZTAP
|