Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Applied cryptography : (Record no. 10179)

MARC details
000 -LEADER
fixed length control field 03139cam a2200409 i 4500
001 - CONTROL NUMBER
control field 670601
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230604100447.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 950327s1996 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 95012398
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780471117094
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471128457
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471117099
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
Description conventions rda
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S35 1996
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 22
Item number S.B.A
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schneier, Bruce,
Dates associated with a name 1963-,
Relator term author
245 10 - TITLE STATEMENT
Title Applied cryptography :
Remainder of title protocols, algorithms, and source code in C /
Statement of responsibility, etc Bruce Schneier.
250 ## - EDITION STATEMENT
Edition statement 2nd edition
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc [1996]
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 758 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note computer bookfair2016
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 675-741) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Foreword / Whitfield Diffie --<br/>1. Foundations --<br/>2. Protocol Building Blocks --<br/>3. Basic Protocols --<br/>4. Intermediate Protocols --<br/>5. Advanced Protocols --<br/>6. Esoteric Protocols --<br/>7. Key Length --<br/>8. Key Management --<br/>9. Algorithm Types and Modes --<br/>10. Using Algorithms --<br/>11. Mathematical Background --<br/>12. Data Encryption Standard (DES) --<br/>13. Other Block Ciphers --<br/>14. Still Other Block Ciphers --<br/>15. Combining Block Ciphers --<br/>16. Pseudo-Random-Sequence Generators and Stream Ciphers --<br/>17. Other Stream Ciphers and Real Random-Sequence Generators --<br/>18. One-Way Hash Functions --<br/>19. Public-Key Algorithms --<br/>20. Public-Key Digital Signature Algorithms --<br/>21. Identification Schemes --<br/>22. Key-Exchange Algorithms --<br/>23. Special Algorithms for Protocols --<br/>24. Example Implementations --<br/>25. Politics --<br/>Afterword / Matt Blaze.
520 ## - SUMMARY, ETC.
Summary, etc This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Telecommunication
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
9 (RLIN) 1154
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Contributor biographical information
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/bios/wiley041/95012398.html">http://www.loc.gov/catdir/bios/wiley041/95012398.html</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Publisher description
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/description/wiley032/95012398.html">http://www.loc.gov/catdir/description/wiley032/95012398.html</a>
856 4# - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of Contents
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/toc/onix02/95012398.html">http://www.loc.gov/catdir/toc/onix02/95012398.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Digital Media Tech. ) Main library Main library A2 02/02/2016 Academic bookshop 588.00 Purchase   005.82 S.B.A 00012972 19/02/2025 02/02/2016 Books