Building SET applications for secure transactions
Κύριοι συγγραφείς: | , , |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Wiley, J.
|
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | 1/4967 | ||
010 | |a 0-471-28305-3 | ||
035 | |l 10011595 | ||
100 | |a 20001113d1998 0grey0105 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a Building SET applications for secure transactions |f Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler | |
210 | |a New York |c John Wiley |d c1998 | ||
215 | |a xii, 403 p. |c fig., tabl. |d 23 cm. | ||
320 | |a Includes index | ||
606 | 0 | |a Επιχειρήσεις |x Ηλεκτρονικοί υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
606 | 0 | |a Ηλεκτρονικό εμπόριο |x Μέτρα ασφαλείας | |
606 | 0 | |a Δεδομένα |x Προστασία | |
615 | |a ΔΙΟΙΚΗΣΗ ΕΠΙΧΕΙΡΗΣΕΩΝ | ||
676 | |a 658.478 | ||
700 | 1 | |a Merkow |b Mark S. | |
701 | 1 | |a Breithaupt |b Jim |f 1955- | |
701 | 1 | |a Wheeler |b Ken L. |f 1955- | |
709 | |a Wiley, J. | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20001211 |h 658.478 MER |p 000026177 |q 000026177 |t BK |y 23 |z 1 | ||
852 | |a INST |b LIBRARY |e 20001211 |h 658.478 MER |p 000026178 |q 000026178 |t BK |y 0 |z 2 | ||
901 | |a ΦΑΣΗ 11 | ||
909 | |b 024221 | ||
909 | |b 024222 (c.2) | ||
960 | |a ΣΕΠΤΕΜΒΡΙΟΣ 2000 | ||
970 | |a ΜΠΑΡΤΖΩΚΑ |b ΞΕΝΙΑ |z 2000-11 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545242592706560 |
---|---|
author | Merkow Mark S. Breithaupt Jim 1955- Wheeler Ken L. 1955- |
author_facet | Merkow Mark S. Breithaupt Jim 1955- Wheeler Ken L. 1955- |
author_role | |
author_sort | Merkow Mark S. |
author_variant | m m s mms b j bj w k l wkl |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 658.478 |
dewey-hundreds | 600 |
dewey-ones | 658 |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 |
format | Book |
fullrecord | {"leader":"01354nam a2200337 i 4500","fields":[{"001":"1/4967"},{"010":{"subfields":[{"a":"0-471-28305-3"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10011595"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20001113d1998 0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Building SET applications for secure transactions"},{"f":"Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"New York"},{"c":"John Wiley"},{"d":"c1998"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xii, 403 p."},{"c":"fig., tabl."},{"d":"23 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0395\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2"},{"x":"\u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03bf\u03af \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03cc \u03b5\u03bc\u03c0\u03cc\u03c1\u03b9\u03bf"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03b1"},{"x":"\u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0394\u0399\u039f\u0399\u039a\u0397\u03a3\u0397 \u0395\u03a0\u0399\u03a7\u0395\u0399\u03a1\u0397\u03a3\u0395\u03a9\u039d"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"658.478"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Merkow"},{"b":"Mark S."}],"ind1":" ","ind2":"1"}},{"701":{"subfields":[{"a":"Breithaupt"},{"b":"Jim"},{"f":"1955-"}],"ind1":" ","ind2":"1"}},{"701":{"subfields":[{"a":"Wheeler"},{"b":"Ken L."},{"f":"1955-"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Wiley, J."}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20001211"},{"h":"658.478 MER"},{"p":"000026177"},{"q":"000026177"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20001211"},{"h":"658.478 MER"},{"p":"000026178"},{"q":"000026178"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"901":{"subfields":[{"a":"\u03a6\u0391\u03a3\u0397 11"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"024221"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"024222 (c.2)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a3\u0395\u03a0\u03a4\u0395\u039c\u0392\u03a1\u0399\u039f\u03a3 2000"}],"ind1":" ","ind2":" "}},{"970":{"subfields":[{"a":"\u039c\u03a0\u0391\u03a1\u03a4\u0396\u03a9\u039a\u0391"},{"b":"\u039e\u0395\u039d\u0399\u0391"},{"z":"2000-11"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/4967 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 0-471-28305-3 |
language | English |
physical | xii, 403 p. fig., tabl. 23 cm. |
publishDate | 1998 |
publisher | Wiley, J. |
record_format | marc |
spelling | 20001113d1998 0grey0105 ba eng Building SET applications for secure transactions Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler New York John Wiley c1998 xii, 403 p. fig., tabl. 23 cm. Includes index Επιχειρήσεις Ηλεκτρονικοί υπολογιστές Δίκτυα Μέτρα ασφαλείας Ηλεκτρονικό εμπόριο Μέτρα ασφαλείας Δεδομένα Προστασία ΔΙΟΙΚΗΣΗ ΕΠΙΧΕΙΡΗΣΕΩΝ 658.478 Merkow Mark S. Breithaupt Jim 1955- Wheeler Ken L. 1955- Wiley, J. GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2 INST LIBRARY 20001211 658.478 MER 000026177 000026177 BK 23 1 INST LIBRARY 20001211 658.478 MER 000026178 000026178 BK 0 2 |
spellingShingle | Merkow Mark S. Breithaupt Jim 1955- Wheeler Ken L. 1955- Building SET applications for secure transactions Επιχειρήσεις Ηλεκτρονικοί υπολογιστές Δίκτυα Μέτρα ασφαλείας Ηλεκτρονικό εμπόριο Μέτρα ασφαλείας Δεδομένα Προστασία ΔΙΟΙΚΗΣΗ ΕΠΙΧΕΙΡΗΣΕΩΝ |
title | Building SET applications for secure transactions |
title_auth | Building SET applications for secure transactions |
title_full | Building SET applications for secure transactions Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler |
title_fullStr | Building SET applications for secure transactions Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler |
title_full_unstemmed | Building SET applications for secure transactions Mark S. Merkow, Jim Breithaupt, Ken L. Wheeler |
title_short | Building SET applications for secure transactions |
topic | Επιχειρήσεις Ηλεκτρονικοί υπολογιστές Δίκτυα Μέτρα ασφαλείας Ηλεκτρονικό εμπόριο Μέτρα ασφαλείας Δεδομένα Προστασία ΔΙΟΙΚΗΣΗ ΕΠΙΧΕΙΡΗΣΕΩΝ |
topic_facet | Επιχειρήσεις Ηλεκτρονικοί υπολογιστές Δίκτυα Μέτρα ασφαλείας Ηλεκτρονικό εμπόριο Μέτρα ασφαλείας Δεδομένα Προστασία |