Internet security cryptographic principles, algorithms and protocols

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Rhee Man Young (Συγγραφέας)
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: Wiley, J.

MARC

LEADER 00000cam a22000001 4500
001 1/8633
010 |a 0-470-85285-2 
010 |a 978-0-470-85285-9 
035 |l 10013317 
100 |a 20080212d2003 y0grey010503 ba 
101 0 |a eng 
200 1 |a Internet security  |e cryptographic principles, algorithms and protocols  |f Man Young Rhee 
210 |a West Sussex  |c Wiley, J.  |d c2003 
215 |a xvii, 405 p.  |c fig., tabl.  |d 25 cm. 
320 |a Bibliography: p.383-390 
320 |a Includes index 
606 0 |a Διαδίκτυο (Internet)  |x Μέτρα ασφαλείας 
606 0 |a Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) 
606 0 |a Firewalls (Computer security) 
606 0 |a Υπολογιστές  |x Δίκτυα  |x Μέτρα ασφαλείας 
606 0 |a Ασφάλεια υπολογιστών 
606 0 |a Πρωτόκολλα δικτύου υπολογιστή 
615 |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 
676 |a 005.82 
700 1 |a Rhee  |b Man Young  |4 070 
709 |a Wiley, J. 
801 0 |a GR  |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2  |c 20080212  |g AACR2 
852 |a INST  |b LIBRARY  |e 20080212  |h 005.82 RHE  |p 000027092  |q 000027092  |t BK  |y 0  |z 2 
852 |a INST  |b LIBRARY  |e 20080212  |h 005.82 RHE  |p 000027094  |q 000027094  |t BK  |y 23  |z 1 
852 |a INST  |b LIBRARY  |e 20080212  |h 005.82 RHE  |p 000027095  |q 000027095  |t BK  |y 0  |z 4 
852 |a INST  |b LIBRARY  |e 20080212  |h 005.82 RHE  |p 000027097  |q 000027097  |t BK  |y 0  |z 3 
909 |b 028296 
909 |b 028297 (c.2) 
909 |b 031536 (c.3) 
909 |b 031537 (c.4) 
960 |a ΦΕΒΡΟΥΑΡΙΟΣ 2008 

Εγγραφή στο Ευρετήριο Αναζήτησης

_version_ 1780545245329489920
author Rhee Man Young
author_facet Rhee Man Young
author_role 070
author_sort Rhee Man Young
author_variant r m y rmy
building Campus Library II
collection LIB2 Catalog
dewey-full 005.82
dewey-hundreds 000
dewey-ones 005
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000
format Book
fullrecord {"leader":"01667cam a22003971 4500","fields":[{"001":"1/8633"},{"010":{"subfields":[{"a":"0-470-85285-2"}],"ind1":" ","ind2":" "}},{"010":{"subfields":[{"a":"978-0-470-85285-9"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10013317"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20080212d2003 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Internet security"},{"e":"cryptographic principles, algorithms and protocols"},{"f":"Man Young Rhee"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"West Sussex"},{"c":"Wiley, J."},{"d":"c2003"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xvii, 405 p."},{"c":"fig., tabl."},{"d":"25 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography: p.383-390"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf (Internet)"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03ac\u03c6\u03b7\u03c3\u03b7 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd (\u0395\u03c0\u03b9\u03c3\u03c4\u03ae\u03bc\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae)"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"Firewalls (Computer security)"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a0\u03c1\u03c9\u03c4\u03cc\u03ba\u03bf\u03bb\u03bb\u03b1 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.82"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Rhee"},{"b":"Man Young"},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Wiley, J."}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20080212"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027092"},{"q":"000027092"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027094"},{"q":"000027094"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027095"},{"q":"000027095"},{"t":"BK"},{"y":"0"},{"z":"4"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027097"},{"q":"000027097"},{"t":"BK"},{"y":"0"},{"z":"3"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028296"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028297 (c.2)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031536 (c.3)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031537 (c.4)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a6\u0395\u0392\u03a1\u039f\u03a5\u0391\u03a1\u0399\u039f\u03a3 2008"}],"ind1":" ","ind2":" "}}]}
id lib2_1/8633
illustrated Illustrated
institution University of West Attica
isbn 0-470-85285-2
978-0-470-85285-9
language English
physical xvii, 405 p. fig., tabl. 25 cm.
publishDate 2003
publisher Wiley, J.
record_format marc
spelling 20080212d2003 y0grey010503 ba
eng
Internet security cryptographic principles, algorithms and protocols Man Young Rhee
West Sussex Wiley, J. c2003
xvii, 405 p. fig., tabl. 25 cm.
Bibliography: p.383-390
Includes index
Διαδίκτυο (Internet) Μέτρα ασφαλείας
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)
Firewalls (Computer security)
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών
Πρωτόκολλα δικτύου υπολογιστή
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
005.82
Rhee Man Young 070
Wiley, J.
GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 20080212 AACR2
INST LIBRARY 20080212 005.82 RHE 000027092 000027092 BK 0 2
INST LIBRARY 20080212 005.82 RHE 000027094 000027094 BK 23 1
INST LIBRARY 20080212 005.82 RHE 000027095 000027095 BK 0 4
INST LIBRARY 20080212 005.82 RHE 000027097 000027097 BK 0 3
spellingShingle Rhee Man Young
Internet security cryptographic principles, algorithms and protocols
Διαδίκτυο (Internet) Μέτρα ασφαλείας
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)
Firewalls (Computer security)
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών
Πρωτόκολλα δικτύου υπολογιστή
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
title Internet security cryptographic principles, algorithms and protocols
title_auth Internet security cryptographic principles, algorithms and protocols
title_full Internet security cryptographic principles, algorithms and protocols Man Young Rhee
title_fullStr Internet security cryptographic principles, algorithms and protocols Man Young Rhee
title_full_unstemmed Internet security cryptographic principles, algorithms and protocols Man Young Rhee
title_short Internet security
title_sub cryptographic principles, algorithms and protocols
topic Διαδίκτυο (Internet) Μέτρα ασφαλείας
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)
Firewalls (Computer security)
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών
Πρωτόκολλα δικτύου υπολογιστή
ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE)
topic_facet Διαδίκτυο (Internet) Μέτρα ασφαλείας
Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή)
Firewalls (Computer security)
Υπολογιστές Δίκτυα Μέτρα ασφαλείας
Ασφάλεια υπολογιστών
Πρωτόκολλα δικτύου υπολογιστή