|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1090681092 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
190326s2019 xx 170 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d ERF
|d OCLCO
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000066234754
|
035 |
|
|
|a (OCoLC)1090681092
|
037 |
|
|
|a CL0501000036
|b Safari Books Online
|
050 |
|
4 |
|a QA76.73.J38
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Costlow, Erik,
|e speaker.
|
245 |
1 |
0 |
|a Hands-on cryptography with Java /
|c Erik Costlow.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c 2019.
|
300 |
|
|
|a 1 online resource (1 streaming video file (2 hr., 49 min., 50 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Erik Costlow.
|
500 |
|
|
|a Title from resource description page (Safari, viewed March 22, 2019).
|
520 |
|
|
|a "Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for developers looking to design a system that uses cryptography, rather than designing new algorithms. Most developers simply need to put the right pieces together to make their own system work. In this course, you will break down the concepts behind cryptography into simple lessons, covering terminology, algorithms, standards, and encryption/decryption techniques. We will also walk through how cryptographic systems are hacked to bypass (rather than break) their cryptographic capabilities."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Java (Computer program language)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
6 |
|a Java (Langage de programmation)
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Java (Computer program language)
|2 fast
|0 (OCoLC)fst00982065
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781838554972/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|