Applied cryptography Protocols, algorithms, and source code in C

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Schneier Bruce 1963-
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: Wiley, J.
Έκδοση:2nd ed.

MARC

LEADER 00000nam a2200000 i 4500
001 1/4843
010 |a 0-471-11709-9 
035 |l 10011532 
100 |a 20001107d1996 0grey0105 ba 
101 0 |a eng 
200 1 |a Applied cryptography  |e Protocols, algorithms, and source code in C  |f Bruce Schneier 
205 |a 2nd ed. 
210 |a New York  |c Wiley  |d c1996 
215 |a xxiii, 758 p.  |c fig., tabl.  |d 24 cm. 
320 |a Bibliography : p.676-741 
320 |a Includes index 
606 0 |a Ασφάλεια υπολογιστών 
606 0 |a Τηλεπικοινωνία  |x Μέτρα ασφαλείας 
606 0 |a Κρυπτογραφία 
606 0 |a Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) 
615 |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 
676 |a 005.8 
700 1 |a Schneier  |b Bruce  |f 1963- 
709 |a Wiley, J. 
801 0 |a GR  |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2  |g AACR2 
852 |a INST  |b LIBRARY  |e 20001211  |h 005.8 SCH  |p 000021493  |q 000021493  |t BK  |y 23  |z 1 
901 |a ΦΑΣΗ 11 
909 |b 023712 
960 |a ΣΕΠΤΕΜΒΡΙΟΣ 2000 
970 |a ΜΠΑΡΤΖΩΚΑ  |b ΞΕΝΙΑ  |z 2000-11 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545242667155456
author Schneier Bruce 1963-
author_facet Schneier Bruce 1963-
author_role
author_sort Schneier Bruce 1963-
author_variant s b sb
building Campus Library II
collection LIB2 Catalog
dewey-full 005.8
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000
edition 2nd ed.
format Book
fullrecord {"leader":"01220nam a2200325 i 4500","fields":[{"001":"1/4843"},{"010":{"subfields":[{"a":"0-471-11709-9"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10011532"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20001107d1996 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Applied cryptography"},{"e":"Protocols, algorithms, and source code in C"},{"f":"Bruce Schneier"}],"ind1":"1","ind2":" "}},{"205":{"subfields":[{"a":"2nd ed."}],"ind1":" ","ind2":" "}},{"210":{"subfields":[{"a":"New York"},{"c":"Wiley"},{"d":"c1996"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xxiii, 758 p."},{"c":"fig., tabl."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography : p.676-741"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a4\u03b7\u03bb\u03b5\u03c0\u03b9\u03ba\u03bf\u03b9\u03bd\u03c9\u03bd\u03af\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03b1\u03c6\u03af\u03b1"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03ac\u03c6\u03b7\u03c3\u03b7 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd (\u0395\u03c0\u03b9\u03c3\u03c4\u03ae\u03bc\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae)"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Schneier"},{"b":"Bruce"},{"f":"1963-"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Wiley, J."}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20001211"},{"h":"005.8 SCH"},{"p":"000021493"},{"q":"000021493"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"901":{"subfields":[{"a":"\u03a6\u0391\u03a3\u0397 11"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"023712"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a3\u0395\u03a0\u03a4\u0395\u039c\u0392\u03a1\u0399\u039f\u03a3 2000"}],"ind1":" ","ind2":" "}},{"970":{"subfields":[{"a":"\u039c\u03a0\u0391\u03a1\u03a4\u0396\u03a9\u039a\u0391"},{"b":"\u039e\u0395\u039d\u0399\u0391"},{"z":"2000-11"}],"ind1":" ","ind2":" "}}]}
id lib2_1/4843
illustrated Illustrated
institution University of West Attica
isbn 0-471-11709-9
language English
physical xxiii, 758 p. fig., tabl. 24 cm.
publishDate 1996
publisher Wiley, J.
record_format marc
spelling 20001107d1996 0grey0105 ba
eng
Applied cryptography Protocols, algorithms, and source code in C Bruce Schneier
2nd ed.
New York Wiley c1996
xxiii, 758 p. fig., tabl. 24 cm.
Bibliography : p.676-741
Includes index
Ασφάλεια υπολογιστών
Τηλεπικοινωνία Μέτρα ασφαλείας
Κρυπτογραφία
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
005.8
Schneier Bruce 1963-
Wiley, J.
GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2
INST LIBRARY 20001211 005.8 SCH 000021493 000021493 BK 23 1
spellingShingle Schneier Bruce 1963-
Applied cryptography Protocols, algorithms, and source code in C
Ασφάλεια υπολογιστών
Τηλεπικοινωνία Μέτρα ασφαλείας
Κρυπτογραφία
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
title Applied cryptography Protocols, algorithms, and source code in C
title_auth Applied cryptography Protocols, algorithms, and source code in C
title_full Applied cryptography Protocols, algorithms, and source code in C Bruce Schneier
title_fullStr Applied cryptography Protocols, algorithms, and source code in C Bruce Schneier
title_full_unstemmed Applied cryptography Protocols, algorithms, and source code in C Bruce Schneier
title_short Applied cryptography
title_sub Protocols, algorithms, and source code in C
topic Ασφάλεια υπολογιστών
Τηλεπικοινωνία Μέτρα ασφαλείας
Κρυπτογραφία
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
topic_facet Ασφάλεια υπολογιστών
Τηλεπικοινωνία Μέτρα ασφαλείας
Κρυπτογραφία
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)