Handbook of Applied Cryptography / (Record no. 72090)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03771nam a2200565Ii 4500 |
001 - CONTROL NUMBER | |
control field | 9780429466335 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711212745.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190122t20181997fluab ob 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780429466335(e-book : PDF) |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8/2 |
100 1# - AUTHOR NAME | |
Author | Menezes, Alfred J., |
245 10 - TITLE STATEMENT | |
Title | Handbook of Applied Cryptography / |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource (810 pages) : |
490 1# - SERIES STATEMENT | |
Series statement | Discrete Mathematics and Its Applications |
520 3# - SUMMARY, ETC. | |
Summary, etc | Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional:It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Access control |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security |
-- | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Access control. |
700 1# - AUTHOR 2 | |
Author 2 | Katz, Jonathan, |
700 1# - AUTHOR 2 | |
Author 2 | van Oorschot, Paul C., |
700 1# - AUTHOR 2 | |
Author 2 | Vanstone, Scott A., |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9780429466335 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Boca Raton, FL : |
-- | CRC Press, |
-- | [2018]. |
264 #4 - | |
-- | ©1997. |
336 ## - | |
-- | text |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | rdacarrier |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Security / General. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Operating Systems / General. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cryptography. |
No items available.