000 | 01407 a2200373 4500 | ||
---|---|---|---|
001 | 57130 | ||
999 |
_c57130 _d14437 |
||
003 | TR-AnTOB | ||
005 | 20210104164034.0 | ||
008 | 061204s2006 njua b 001 0 eng | ||
010 | _a2005018455 | ||
020 | _a0321320735 | ||
040 |
_aDLC _cDLC _dDLC |
||
041 | _aeng | ||
042 | _apcc | ||
050 |
_aQA76.9.D314 _bK45 2006 |
||
090 | _aQA76.9.D314 K45 2006 | ||
100 |
_aKenan, Kevin _929628 |
||
245 | 0 |
_aCryptography in the database : _bthe last line of defense / _cKevin Kenan. |
|
264 | 1 |
_aUpper Saddle River, NJ : _bAddison Wesley, _cc2006. |
|
300 |
_axxii, 277 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references (p. 255-256) and index. | ||
650 | 0 |
_aDatabase security _929629 |
|
650 | 7 |
_aVeritabanı güvenliği _2etuturkob _929630 |
|
650 |
_aKriptografi _929631 |
||
650 |
_aCryptography _9428 |
||
856 | 4 |
_uhttp://www.loc.gov/catdir/toc/ecip0515/2005018455.html _3Table of contents |
|
901 | _a0017628 | ||
902 | _aGT | ||
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
925 | 0 |
_aacquire _b2 shelf copies _xpolicy default |
|
955 |
_djf09 2005-06-29 to sl _ejf09 2005-06-29 to Dewey _fjf17 2005-12-19; _gjf17 2005-12-19 to BCCD |
||
942 | _cBK |