| 000 | 01425cam a2200433 i 4500 | ||
|---|---|---|---|
| 999 |
_c7745 _d7745 |
||
| 001 | 825749781 | ||
| 003 | OCoLC | ||
| 005 | 20220814160203.0 | ||
| 008 | 130311t20142014maua b 001 0 eng | ||
| 010 | _a2012047546 | ||
| 020 | _a9780133354690 (alk. paper) | ||
| 020 | _a0133354695 (alk. paper) | ||
| 020 | _a0273793357 | ||
| 020 | _a9780273793359 | ||
| 035 | _a.b72731382 | ||
| 040 |
_aDLC _beng _erda _cDLC _dEG-NcFUE |
||
| 042 | _apcc | ||
| 049 | _aOSUU | ||
| 050 | 0 | 0 |
_aTK5105.59 _b.S713 2014 |
| 050 | 0 | 0 |
_aTK5105.59 _b.S713 2014 |
| 082 | 0 | 0 |
_a005.8 _223 _bS.W.C |
| 100 | 1 | _aStallings, William. | |
| 245 | 1 | 0 |
_aCryptography and network security : _bprinciples and practice / _cWilliam Stallings. |
| 250 | _aSixth edition. | ||
| 260 |
_aUpper Saddle River, N.J. : _bPrentice Hall, _cc2014. |
||
| 264 | 1 |
_aUpper Saddle River, N.J. : _bPrentice Hall, _c[2014] |
|
| 264 | 4 | _c©2014 | |
| 300 |
_axix, 751 pages : _billustrations ; _c24 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 504 | _aIncludes bibliographical references (pages 710-719) and index. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aData encryption (Computer science) _916940 |
|
| 650 | 0 |
_aCoding theory. _916941 |
|
| 650 | 0 | _aComputer security. | |
| 856 |
_3Abstract _uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3527 |
||
| 942 |
_2ddc _cTB |
||