Cryptography an introduction to computer security
Κύριοι συγγραφείς: | , |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Prentice Hall
|
Σειρά: | Prentice Hall Advances in Computer Science Series |
MARC
LEADER | 00000cam0a2200000 4500 | ||
---|---|---|---|
001 | 1/13186 | ||
010 | |a 0-13-194986-1 | ||
035 | |l 10001821 | ||
100 | |a 19981001d1989 0grey0105 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a Cryptography |e an introduction to computer security |f Jennifer Seberry, Josef Pieprzyk | |
210 | |a New York |c Prentice-Hall |d c1989 | ||
215 | |a viii, 375 p. |c fig., tabl. |d 24 cm. | ||
225 | 2 | |a Prentice Hall Advances in Computer Science Series | |
320 | |a Bibliography: p.344-365 | ||
320 | |a Includes index | ||
410 | 1 | |t Prentice Hall Advances in Computer Science Series | |
606 | 0 | |a Ηλεκτρονικοί υπολογιστές |x Ελεγχος προσπέλασης | |
606 | 0 | |a Κρυπτογραφία | |
676 | |a 005.8 | ||
700 | 1 | |a Seberry |b Jennifer |4 070 | |
701 | 1 | |a Pieprzyk |b Josef |4 070 | |
709 | |a Prentice Hall | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 |g AACR2 | |
852 | |a INST |b LIBRARY |e 19981008 |h 005.8 SEB |p 000002314 |q 000002314 |t BK |y 23 |z 1 | ||
909 | |b 009011 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545235753893889 |
---|---|
author | Seberry Jennifer Pieprzyk Josef |
author_facet | Seberry Jennifer Pieprzyk Josef |
author_role | 070 070 |
author_sort | Seberry Jennifer |
author_variant | s j sj p j pj |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.8 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 |
format | Book |
fullrecord | {"leader":"01053cam0a2200277 4500","fields":[{"001":"1/13186"},{"010":{"subfields":[{"a":"0-13-194986-1"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10001821"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"19981001d1989 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Cryptography"},{"e":"an introduction to computer security"},{"f":"Jennifer Seberry, Josef Pieprzyk"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"New York"},{"c":"Prentice-Hall"},{"d":"c1989"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"viii, 375 p."},{"c":"fig., tabl."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"225":{"subfields":[{"a":"Prentice Hall Advances in Computer Science Series"}],"ind1":"2","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography: p.344-365"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"410":{"subfields":[{"t":"Prentice Hall Advances in Computer Science Series"}],"ind1":" ","ind2":"1"}},{"606":{"subfields":[{"a":"\u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03bf\u03af \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0395\u03bb\u03b5\u03b3\u03c7\u03bf\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c0\u03ad\u03bb\u03b1\u03c3\u03b7\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03b1\u03c6\u03af\u03b1"}],"ind1":"0","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Seberry"},{"b":"Jennifer"},{"4":"070"}],"ind1":" ","ind2":"1"}},{"701":{"subfields":[{"a":"Pieprzyk"},{"b":"Josef"},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Prentice Hall"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"19981008"},{"h":"005.8 SEB"},{"p":"000002314"},{"q":"000002314"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"009011"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/13186 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 0-13-194986-1 |
language | English |
physical | viii, 375 p. fig., tabl. 24 cm. |
publishDate | 1989 |
publisher | Prentice Hall |
record_format | marc |
series2 | Prentice Hall Advances in Computer Science Series |
spelling | 19981001d1989 0grey0105 ba eng Cryptography an introduction to computer security Jennifer Seberry, Josef Pieprzyk New York Prentice-Hall c1989 viii, 375 p. fig., tabl. 24 cm. Prentice Hall Advances in Computer Science Series Bibliography: p.344-365 Includes index Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Κρυπτογραφία 005.8 Seberry Jennifer 070 Pieprzyk Josef 070 Prentice Hall GR ΠΑ.Δ.Α. Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2 INST LIBRARY 19981008 005.8 SEB 000002314 000002314 BK 23 1 |
spellingShingle | Seberry Jennifer Pieprzyk Josef Cryptography an introduction to computer security Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Κρυπτογραφία |
title | Cryptography an introduction to computer security |
title_auth | Cryptography an introduction to computer security |
title_full | Cryptography an introduction to computer security Jennifer Seberry, Josef Pieprzyk |
title_fullStr | Cryptography an introduction to computer security Jennifer Seberry, Josef Pieprzyk |
title_full_unstemmed | Cryptography an introduction to computer security Jennifer Seberry, Josef Pieprzyk |
title_short | Cryptography |
title_sub | an introduction to computer security |
topic | Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Κρυπτογραφία |
topic_facet | Ηλεκτρονικοί υπολογιστές Ελεγχος προσπέλασης Κρυπτογραφία |