|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn501191416 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
100121s2009 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d UBY
|d CEF
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d CNNAI
|d OCLCF
|d OCLCQ
|d OCLCA
|d OCLCQ
|d AU@
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1044259832
|a 1056437418
|a 1058873274
|a 1060820938
|a 1075406187
|a 1097141365
|a 1116039963
|
020 |
|
|
|a 9780123744791
|
020 |
|
|
|a 0123744792
|
020 |
|
|
|a 661216879X
|q (ebk.)
|
020 |
|
|
|a 9786612168796
|q (ebk.)
|
024 |
8 |
|
|a 9786612168796
|
029 |
1 |
|
|a DEBSZ
|b 355395398
|
029 |
1 |
|
|a HEBIS
|b 291468616
|
035 |
|
|
|a (OCoLC)501191416
|z (OCoLC)1044259832
|z (OCoLC)1056437418
|z (OCoLC)1058873274
|z (OCoLC)1060820938
|z (OCoLC)1075406187
|z (OCoLC)1097141365
|z (OCoLC)1116039963
|
037 |
|
|
|a CL0500000055
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .W39 2009
|
082 |
0 |
4 |
|a 005.82
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wayner, Peter,
|d 1964-
|
245 |
1 |
0 |
|a Disappearing cryptography :
|b information hiding, steganography & watermarking /
|c Peter Wayner.
|
250 |
|
|
|a 3rd ed.
|
260 |
|
|
|a Burlington, Mass. :
|b Morgan Kaufmann,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xv, 439 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 403-430) and index.
|
505 |
0 |
|
|a Framing information -- Encryption -- Error correction -- Secret sharing -- Compression -- Basic mimicry -- Grammars and mimicry -- Turing and reverse -- Life in the noise -- Anonymous remailers -- Secret broadcasts -- Keys -- Ordering and reordering -- Spreading -- Synthetic worlds -- Watermarks -- Steganalysis -- Obfuscation -- Synchronization -- Translucent databases -- Plain sight -- Coda.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Internet.
|
650 |
|
2 |
|a Internet
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Internet.
|
650 |
|
7 |
|a Internet.
|2 aat
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Cryptography.
|2 blmlsh
|
650 |
|
7 |
|a Internet.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Internet
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9786612168796
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780123744791/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|