MARC details
| 000 -LEADER |
| fixed length control field |
03139cam a2200409 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
670601 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20230604100447.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
950327s1996 nyua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
95012398 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780471117094 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0471128457 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0471117099 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Transcribing agency |
DLC |
| Modifying agency |
DLC |
| Description conventions |
rda |
| 050 04 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
S35 1996 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.82 |
| Edition number |
22 |
| Item number |
S.B.A |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Schneier, Bruce, |
| Dates associated with a name |
1963-, |
| Relator term |
author |
| 245 10 - TITLE STATEMENT |
| Title |
Applied cryptography : |
| Remainder of title |
protocols, algorithms, and source code in C / |
| Statement of responsibility, etc |
Bruce Schneier. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
2nd edition |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
New York : |
| Name of publisher, distributor, etc |
Wiley, |
| Date of publication, distribution, etc |
[1996] |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiii, 758 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 500 ## - GENERAL NOTE |
| General note |
computer bookfair2016 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (pages 675-741) and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Foreword / Whitfield Diffie --<br/>1. Foundations --<br/>2. Protocol Building Blocks --<br/>3. Basic Protocols --<br/>4. Intermediate Protocols --<br/>5. Advanced Protocols --<br/>6. Esoteric Protocols --<br/>7. Key Length --<br/>8. Key Management --<br/>9. Algorithm Types and Modes --<br/>10. Using Algorithms --<br/>11. Mathematical Background --<br/>12. Data Encryption Standard (DES) --<br/>13. Other Block Ciphers --<br/>14. Still Other Block Ciphers --<br/>15. Combining Block Ciphers --<br/>16. Pseudo-Random-Sequence Generators and Stream Ciphers --<br/>17. Other Stream Ciphers and Real Random-Sequence Generators --<br/>18. One-Way Hash Functions --<br/>19. Public-Key Algorithms --<br/>20. Public-Key Digital Signature Algorithms --<br/>21. Identification Schemes --<br/>22. Key-Exchange Algorithms --<br/>23. Special Algorithms for Protocols --<br/>24. Example Implementations --<br/>25. Politics --<br/>Afterword / Matt Blaze. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Telecommunication |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cryptography. |
| 9 (RLIN) |
1154 |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Contributor biographical information |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/bios/wiley041/95012398.html">http://www.loc.gov/catdir/bios/wiley041/95012398.html</a> |
| 856 42 - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Publisher description |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/description/wiley032/95012398.html">http://www.loc.gov/catdir/description/wiley032/95012398.html</a> |
| 856 4# - ELECTRONIC LOCATION AND ACCESS |
| Materials specified |
Table of Contents |
| Uniform Resource Identifier |
<a href="http://www.loc.gov/catdir/toc/onix02/95012398.html">http://www.loc.gov/catdir/toc/onix02/95012398.html</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |