000 | 03295cam a2200469 i 4500 | ||
---|---|---|---|
999 |
_c200436359 _d54571 |
||
001 | 200436359 | ||
003 | TR-AnTOB | ||
005 | 20200109121757.0 | ||
007 | ta | ||
008 | 950327t19961996nyua b 001 0 eng | ||
010 | _a95012398 | ||
015 | _aGB96-3062 | ||
020 | _a0471128457 (cloth : acidfree paper) | ||
020 | _a0471117099 (paper : acidfree paper) | ||
020 | _a9780471117094 (paper : acidfree paper) | ||
035 | _a32311687 | ||
035 | _a(TR-AnTOB)200436359 | ||
040 |
_aDLC _beng _erda _cDLC _dUKM _dUtOrBLW _dTR-AnTOB |
||
041 | 0 | _aeng | |
050 | 0 | 0 |
_aQA76.9.A25 _bS35 1996 |
090 |
_aQA76.9.A25 _bS35 1996 |
||
100 | 1 |
_aSchneier, Bruce, _d1963- _eauthor _0http://id.loc.gov/authorities/names/n93043083. _92794 |
|
245 | 1 | 0 |
_aApplied cryptography : _bprotocols, algorithms, and source code in C / _cBruce Schneier. |
250 | _aSecond edition. | ||
264 | 1 |
_aNew York : _bWiley, _c[1996]. |
|
264 | 4 | _c ©1996 | |
300 |
_axxiii, 758 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent. |
||
337 |
_aunmediated _bn _2rdamedia. |
||
338 |
_avolume _bnc _2rdacarrier. |
||
504 | _aIncludes bibliographical references (pages 675-741) and index. | ||
505 |
_tForeword / _rWhitfield Diffie - _g1. _tFoundations -- _g2. _tProtocol Building Blocks -- _g3. _tBasic Protocols -- _g4. _tIntermediate Protocols -- _g5. _tAdvanced Protocols -- _g6. _tEsoteric Protocols -- _g7. _tKey Length -- _g8. _tKey Management -- _g9. _tAlgorithm Types and Modes -- _g10. _tUsing Algorithms -- _g11. _tMathematical Background -- _g12. _tData Encryption Standard (DES) -- _g13. _tOther Block Ciphers -- _g14. _tStill Other Block Ciphers -- _g15. _tCombining Block Ciphers -- _g16. _tPseudo-Random-Sequence Generators and Stream Ciphers -- _g17. _tOther Stream Ciphers and Real Random-Sequence Generators -- _g18. _tOne-Way Hash Functions -- _g19. _tPublic-Key Algorithms -- _g20. _tPublic-Key Digital Signature Algorithms -- _g21. _tIdentification Schemes -- _g22. _tKey-Exchange Algorithms -- _g23. _tSpecial Algorithms for Protocols -- _g24. _tExample Implementations -- _g25. _tPolitics -- _tAfterword / _rMatt Blaze. |
||
520 | _aThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover. | ||
590 | _aDonated by Kemal Bıçakcı | ||
650 | 0 |
_aComputer security _0http://id.loc.gov/authorities/subjects/sh90001862. _9912 |
|
650 | 0 |
_aCryptography _0http://id.loc.gov/authorities/subjects/sh85034453. _9428 |
|
650 | 0 |
_aTelecommunication _xSecurity measures _0http://id.loc.gov/authorities/subjects/sh85133285. _9125697 |
|
653 | 0 | _aCryptology. | |
942 |
_2lcc _cBK |