Cryptography and network security Principles and practice
Κύριος συγγραφέας: | |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Prentice Hall
|
Έκδοση: | 2nd ed. |
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | 1/5597 | ||
005 | 20181008113910.0 | ||
010 | |a 0138690170 | ||
035 | |l 10005394 | ||
100 | |a 19990123d1999 y0grey0105 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a Cryptography and network security |e Principles and practice |f William Stallings | |
205 | |a 2nd ed. | ||
210 | |a Upper Saddle River, N.J. |c Prentice Hall |d c1999 | ||
215 | |a xi, 569 p. |c diagr. |d 24 cm. | ||
320 | |a Bibliography: p. 544-558 | ||
606 | 0 | |a Υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
606 | 0 | |a Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) | |
606 | 0 | |a Διασφάλιση υπολογιστή | |
606 | 0 | |a Διασφάλιση βάσης δεδομένων | |
606 | 0 | |a Θεωρία κωδίκων | |
676 | |a 005.8 | ||
700 | 1 | |a Stallings |b William | |
709 | |a Prentice Hall | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 |g AACR2 | |
852 | |a INST |b LIBRARY |e 19990204 |h 005.8 STA |p 000018116 |q 000018116 |t BK |y 23 |z 1 | ||
852 | |a INST |b LIBRARY |e 20000720 |h 005.8 STA |p 000021495 |q 000021495 |t BK |y 0 |z 2 | ||
901 | |a PART-IV Φ.23 | ||
909 | |b 013401 | ||
909 | |b 023705 (c.2) | ||
970 | |a ΚΟΥΤΡΑΣ |b ΓΙΩΡΓΟΣ |z 1999-01 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545243068760065 |
---|---|
author | Stallings William |
author_facet | Stallings William |
author_role | |
author_sort | Stallings William |
author_variant | s w sw |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.8 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 |
edition | 2nd ed. |
format | Book |
fullrecord | {"leader":"01312nam a2200337 i 4500","fields":[{"001":"1/5597"},{"005":"20181008113910.0"},{"010":{"subfields":[{"a":"0138690170"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10005394"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"19990123d1999 y0grey0105 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Cryptography and network security"},{"e":"Principles and practice"},{"f":"William Stallings"}],"ind1":"1","ind2":" "}},{"205":{"subfields":[{"a":"2nd ed."}],"ind1":" ","ind2":" "}},{"210":{"subfields":[{"a":"Upper Saddle River, N.J."},{"c":"Prentice Hall"},{"d":"c1999"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xi, 569 p."},{"c":"diagr."},{"d":"24 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography: p. 544-558"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03ac\u03c6\u03b7\u03c3\u03b7 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd (\u0395\u03c0\u03b9\u03c3\u03c4\u03ae\u03bc\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae)"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03c3\u03c6\u03ac\u03bb\u03b9\u03c3\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03c3\u03c6\u03ac\u03bb\u03b9\u03c3\u03b7 \u03b2\u03ac\u03c3\u03b7\u03c2 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0398\u03b5\u03c9\u03c1\u03af\u03b1 \u03ba\u03c9\u03b4\u03af\u03ba\u03c9\u03bd"}],"ind1":"0","ind2":" "}},{"676":{"subfields":[{"a":"005.8"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Stallings"},{"b":"William"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Prentice Hall"}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"19990204"},{"h":"005.8 STA"},{"p":"000018116"},{"q":"000018116"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20000720"},{"h":"005.8 STA"},{"p":"000021495"},{"q":"000021495"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"901":{"subfields":[{"a":"PART-IV \u03a6.23"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"013401"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"023705 (c.2)"}],"ind1":" ","ind2":" "}},{"970":{"subfields":[{"a":"\u039a\u039f\u03a5\u03a4\u03a1\u0391\u03a3"},{"b":"\u0393\u0399\u03a9\u03a1\u0393\u039f\u03a3"},{"z":"1999-01"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/5597 |
illustrated | Not Illustrated |
institution | University of West Attica |
isbn | 0138690170 |
language | English |
physical | xi, 569 p. diagr. 24 cm. |
publishDate | 1999 |
publisher | Prentice Hall |
record_format | marc |
spelling | 19990123d1999 y0grey0105 ba eng Cryptography and network security Principles and practice William Stallings 2nd ed. Upper Saddle River, N.J. Prentice Hall c1999 xi, 569 p. diagr. 24 cm. Bibliography: p. 544-558 Υπολογιστές Δίκτυα Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Διασφάλιση υπολογιστή Διασφάλιση βάσης δεδομένων Θεωρία κωδίκων 005.8 Stallings William Prentice Hall GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 AACR2 INST LIBRARY 19990204 005.8 STA 000018116 000018116 BK 23 1 INST LIBRARY 20000720 005.8 STA 000021495 000021495 BK 0 2 |
spellingShingle | Stallings William Cryptography and network security Principles and practice Υπολογιστές Δίκτυα Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Διασφάλιση υπολογιστή Διασφάλιση βάσης δεδομένων Θεωρία κωδίκων |
title | Cryptography and network security Principles and practice |
title_auth | Cryptography and network security Principles and practice |
title_full | Cryptography and network security Principles and practice William Stallings |
title_fullStr | Cryptography and network security Principles and practice William Stallings |
title_full_unstemmed | Cryptography and network security Principles and practice William Stallings |
title_short | Cryptography and network security |
title_sub | Principles and practice |
topic | Υπολογιστές Δίκτυα Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Διασφάλιση υπολογιστή Διασφάλιση βάσης δεδομένων Θεωρία κωδίκων |
topic_facet | Υπολογιστές Δίκτυα Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Διασφάλιση υπολογιστή Διασφάλιση βάσης δεδομένων Θεωρία κωδίκων |