|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn233000204 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
080515s2008 inua ob 001 0 eng d |
010 |
|
|
|a 2007051636
|
040 |
|
|
|a CtWfDGI
|b eng
|e pn
|c COCUF
|d COO
|d UMI
|d CEF
|d OCLCQ
|d NHM
|d B24X7
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCA
|d LIV
|d OCLCQ
|d OCLCA
|d WYU
|d UAB
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 402405784
|a 606040017
|a 1044290693
|a 1056379414
|a 1064635049
|a 1073041769
|a 1097107765
|a 1192327881
|a 1240509695
|
020 |
|
|
|a 047013593X
|
020 |
|
|
|a 9780470135938
|
020 |
|
|
|z 9780470135938
|
029 |
1 |
|
|a AU@
|b 000053250133
|
029 |
1 |
|
|a DEBSZ
|b 355411644
|
029 |
1 |
|
|a HEBIS
|b 291484034
|
029 |
1 |
|
|a AU@
|b 000067111215
|
035 |
|
|
|a (OCoLC)233000204
|z (OCoLC)402405784
|z (OCoLC)606040017
|z (OCoLC)1044290693
|z (OCoLC)1056379414
|z (OCoLC)1064635049
|z (OCoLC)1073041769
|z (OCoLC)1097107765
|z (OCoLC)1192327881
|z (OCoLC)1240509695
|
037 |
|
|
|a CL0500000043
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b S932 2008eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Swenson, Christopher,
|d 1983-
|
245 |
1 |
0 |
|a Modern cryptanalysis :
|b techniques for advanced code breaking /
|c Christopher Swenson.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley Pub.,
|c ©2008.
|
300 |
|
|
|a 1 online resource (xxviii, 236 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and indexs.
|
505 |
0 |
|
|a Simple ciphers -- Number theoretical ciphers -- Factoring and discrete logarithms -- Block ciphers -- General cryptanalytic methods -- Linear cryptanalysis -- Differential cryptanalysis.
|
520 |
1 |
|
|a "Christopher Swenson provides a foundation in traditional cryptanalysis, examines ciphers based on number theory, explores block ciphers, and teaches the basis of all modern cryptanalysis - linear and differential cryptanalysis. This time-honored weapon of warfare has become a key piece of artillery in the battle for information security."--Jacket.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 blmlsh
|
650 |
|
7 |
|a Cryptography.
|2 blmlsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470135938/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00024416
|
994 |
|
|
|a 92
|b IZTAP
|