Internet security cryptographic principles, algorithms and protocols
Κύριος συγγραφέας: | |
---|---|
Μορφή: | Βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Wiley, J.
|
MARC
LEADER | 00000cam a22000001 4500 | ||
---|---|---|---|
001 | 1/8633 | ||
010 | |a 0-470-85285-2 | ||
010 | |a 978-0-470-85285-9 | ||
035 | |l 10013317 | ||
100 | |a 20080212d2003 y0grey010503 ba | ||
101 | 0 | |a eng | |
200 | 1 | |a Internet security |e cryptographic principles, algorithms and protocols |f Man Young Rhee | |
210 | |a West Sussex |c Wiley, J. |d c2003 | ||
215 | |a xvii, 405 p. |c fig., tabl. |d 25 cm. | ||
320 | |a Bibliography: p.383-390 | ||
320 | |a Includes index | ||
606 | 0 | |a Διαδίκτυο (Internet) |x Μέτρα ασφαλείας | |
606 | 0 | |a Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) | |
606 | 0 | |a Firewalls (Computer security) | |
606 | 0 | |a Υπολογιστές |x Δίκτυα |x Μέτρα ασφαλείας | |
606 | 0 | |a Ασφάλεια υπολογιστών | |
606 | 0 | |a Πρωτόκολλα δικτύου υπολογιστή | |
615 | |a ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) | ||
676 | |a 005.82 | ||
700 | 1 | |a Rhee |b Man Young |4 070 | |
709 | |a Wiley, J. | ||
801 | 0 | |a GR |b ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 |c 20080212 |g AACR2 | |
852 | |a INST |b LIBRARY |e 20080212 |h 005.82 RHE |p 000027092 |q 000027092 |t BK |y 0 |z 2 | ||
852 | |a INST |b LIBRARY |e 20080212 |h 005.82 RHE |p 000027094 |q 000027094 |t BK |y 23 |z 1 | ||
852 | |a INST |b LIBRARY |e 20080212 |h 005.82 RHE |p 000027095 |q 000027095 |t BK |y 0 |z 4 | ||
852 | |a INST |b LIBRARY |e 20080212 |h 005.82 RHE |p 000027097 |q 000027097 |t BK |y 0 |z 3 | ||
909 | |b 028296 | ||
909 | |b 028297 (c.2) | ||
909 | |b 031536 (c.3) | ||
909 | |b 031537 (c.4) | ||
960 | |a ΦΕΒΡΟΥΑΡΙΟΣ 2008 |
Εγγραφή στο Ευρετήριο Αναζήτησης
_version_ | 1780545245329489920 |
---|---|
author | Rhee Man Young |
author_facet | Rhee Man Young |
author_role | 070 |
author_sort | Rhee Man Young |
author_variant | r m y rmy |
building | Campus Library II |
collection | LIB2 Catalog |
dewey-full | 005.82 |
dewey-hundreds | 000 |
dewey-ones | 005 |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 |
format | Book |
fullrecord | {"leader":"01667cam a22003971 4500","fields":[{"001":"1/8633"},{"010":{"subfields":[{"a":"0-470-85285-2"}],"ind1":" ","ind2":" "}},{"010":{"subfields":[{"a":"978-0-470-85285-9"}],"ind1":" ","ind2":" "}},{"035":{"subfields":[{"l":"10013317"}],"ind1":" ","ind2":" "}},{"100":{"subfields":[{"a":"20080212d2003 y0grey010503 ba"}],"ind1":" ","ind2":" "}},{"101":{"subfields":[{"a":"eng"}],"ind1":"0","ind2":" "}},{"200":{"subfields":[{"a":"Internet security"},{"e":"cryptographic principles, algorithms and protocols"},{"f":"Man Young Rhee"}],"ind1":"1","ind2":" "}},{"210":{"subfields":[{"a":"West Sussex"},{"c":"Wiley, J."},{"d":"c2003"}],"ind1":" ","ind2":" "}},{"215":{"subfields":[{"a":"xvii, 405 p."},{"c":"fig., tabl."},{"d":"25 cm."}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Bibliography: p.383-390"}],"ind1":" ","ind2":" "}},{"320":{"subfields":[{"a":"Includes index"}],"ind1":" ","ind2":" "}},{"606":{"subfields":[{"a":"\u0394\u03b9\u03b1\u03b4\u03af\u03ba\u03c4\u03c5\u03bf (Internet)"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u039a\u03c1\u03c5\u03c0\u03c4\u03bf\u03b3\u03c1\u03ac\u03c6\u03b7\u03c3\u03b7 \u03b4\u03b5\u03b4\u03bf\u03bc\u03ad\u03bd\u03c9\u03bd (\u0395\u03c0\u03b9\u03c3\u03c4\u03ae\u03bc\u03b7 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae)"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"Firewalls (Computer security)"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ad\u03c2"},{"x":"\u0394\u03af\u03ba\u03c4\u03c5\u03b1"},{"x":"\u039c\u03ad\u03c4\u03c1\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u0391\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ce\u03bd"}],"ind1":"0","ind2":" "}},{"606":{"subfields":[{"a":"\u03a0\u03c1\u03c9\u03c4\u03cc\u03ba\u03bf\u03bb\u03bb\u03b1 \u03b4\u03b9\u03ba\u03c4\u03cd\u03bf\u03c5 \u03c5\u03c0\u03bf\u03bb\u03bf\u03b3\u03b9\u03c3\u03c4\u03ae"}],"ind1":"0","ind2":" "}},{"615":{"subfields":[{"a":"\u0395\u03a0\u0399\u03a3\u03a4\u0397\u039c\u0397 \u03a5\u03a0\u039f\u039b\u039f\u0393\u0399\u03a3\u03a4\u0397 (SOFTWARE)"}],"ind1":" ","ind2":" "}},{"676":{"subfields":[{"a":"005.82"}],"ind1":" ","ind2":" "}},{"700":{"subfields":[{"a":"Rhee"},{"b":"Man Young"},{"4":"070"}],"ind1":" ","ind2":"1"}},{"709":{"subfields":[{"a":"Wiley, J."}],"ind1":" ","ind2":" "}},{"801":{"subfields":[{"a":"GR"},{"b":"\u03a0\u0391.\u0394.\u0391. - \u0392\u03b9\u03b2\u03bb\u03b9\u03bf\u03b8\u03ae\u03ba\u03b7 \u03a0\u03b1\u03bd\u03b5\u03c0\u03b9\u03c3\u03c4\u03b7\u03bc\u03b9\u03bf\u03cd\u03c0\u03bf\u03bb\u03b7\u03c2 2"},{"c":"20080212"},{"g":"AACR2"}],"ind1":" ","ind2":"0"}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027092"},{"q":"000027092"},{"t":"BK"},{"y":"0"},{"z":"2"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027094"},{"q":"000027094"},{"t":"BK"},{"y":"23"},{"z":"1"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027095"},{"q":"000027095"},{"t":"BK"},{"y":"0"},{"z":"4"}],"ind1":" ","ind2":" "}},{"852":{"subfields":[{"a":"INST"},{"b":"LIBRARY"},{"e":"20080212"},{"h":"005.82 RHE"},{"p":"000027097"},{"q":"000027097"},{"t":"BK"},{"y":"0"},{"z":"3"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028296"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"028297 (c.2)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031536 (c.3)"}],"ind1":" ","ind2":" "}},{"909":{"subfields":[{"b":"031537 (c.4)"}],"ind1":" ","ind2":" "}},{"960":{"subfields":[{"a":"\u03a6\u0395\u0392\u03a1\u039f\u03a5\u0391\u03a1\u0399\u039f\u03a3 2008"}],"ind1":" ","ind2":" "}}]}
|
id | lib2_1/8633 |
illustrated | Illustrated |
institution | University of West Attica |
isbn | 0-470-85285-2 978-0-470-85285-9 |
language | English |
physical | xvii, 405 p. fig., tabl. 25 cm. |
publishDate | 2003 |
publisher | Wiley, J. |
record_format | marc |
spelling | 20080212d2003 y0grey010503 ba eng Internet security cryptographic principles, algorithms and protocols Man Young Rhee West Sussex Wiley, J. c2003 xvii, 405 p. fig., tabl. 25 cm. Bibliography: p.383-390 Includes index Διαδίκτυο (Internet) Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Firewalls (Computer security) Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών Πρωτόκολλα δικτύου υπολογιστή ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) 005.82 Rhee Man Young 070 Wiley, J. GR ΠΑ.Δ.Α. - Βιβλιοθήκη Πανεπιστημιούπολης 2 20080212 AACR2 INST LIBRARY 20080212 005.82 RHE 000027092 000027092 BK 0 2 INST LIBRARY 20080212 005.82 RHE 000027094 000027094 BK 23 1 INST LIBRARY 20080212 005.82 RHE 000027095 000027095 BK 0 4 INST LIBRARY 20080212 005.82 RHE 000027097 000027097 BK 0 3 |
spellingShingle | Rhee Man Young Internet security cryptographic principles, algorithms and protocols Διαδίκτυο (Internet) Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Firewalls (Computer security) Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών Πρωτόκολλα δικτύου υπολογιστή ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
title | Internet security cryptographic principles, algorithms and protocols |
title_auth | Internet security cryptographic principles, algorithms and protocols |
title_full | Internet security cryptographic principles, algorithms and protocols Man Young Rhee |
title_fullStr | Internet security cryptographic principles, algorithms and protocols Man Young Rhee |
title_full_unstemmed | Internet security cryptographic principles, algorithms and protocols Man Young Rhee |
title_short | Internet security |
title_sub | cryptographic principles, algorithms and protocols |
topic | Διαδίκτυο (Internet) Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Firewalls (Computer security) Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών Πρωτόκολλα δικτύου υπολογιστή ΕΠΙΣΤΗΜΗ ΥΠΟΛΟΓΙΣΤΗ (SOFTWARE) |
topic_facet | Διαδίκτυο (Internet) Μέτρα ασφαλείας Κρυπτογράφηση δεδομένων (Επιστήμη υπολογιστή) Firewalls (Computer security) Υπολογιστές Δίκτυα Μέτρα ασφαλείας Ασφάλεια υπολογιστών Πρωτόκολλα δικτύου υπολογιστή |