Applied cryptography : (Record no. 8397)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01398nam a22002177a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230327b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788126513680 (pbk) |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 |
Item number | SCH |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Schneier, Bruce |
245 ## - TITLE STATEMENT | |
Title | Applied cryptography : |
Remainder of title | protocols algorithms and source code in C |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | New Delhi |
Name of publisher, distributor, etc. | Wiley India |
Date of publication, distribution, etc. | 2006 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiii, 758p. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | C (Computer program language) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Telecommunication--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Software engineering |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 447 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 4505 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 987 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 8414 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 907 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | bill no. | bill date | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Computer science | IN-12998 | 13/03/2023 | Plaksha University Library | Plaksha University Library | 27/03/2023 | Amazon.in | 2813.00 | 005.82 SCH | 003891 | 09/07/2023 | 27/03/2023 | Book |