Applied cryptography : (Record no. 663)

MARC details
000 -LEADER
fixed length control field 02986cam a2200385 i 4500
001 - CONTROL NUMBER
control field 670601
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230531130905.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 950327s1996 nyua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 95012398
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471128457
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780471117094
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency DLC
-- EG-CaTKH
Description conventions rda
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S35 1996
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82 SC.A 1996 G.C
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Schneier, Bruce,
Dates associated with a name 1963-
Relator term author.
245 10 - TITLE STATEMENT
Title Applied cryptography :
Remainder of title protocols, algorithms, and source code in C /
Statement of responsibility, etc. Bruce Schneier.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 1996.
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 758 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 675-741) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Foreword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze.
520 ## - SUMMARY, ETC.
Summary, etc. This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Telecommunication
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name yomna.nassar
Cataloging process P
First Date, FD (RLIN) 20230531
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20230531
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ocip
f 19
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Gift collections The Knowledge Hub Library The Knowledge Hub Library 02/21/2021   005.82 SC.A 1996 G.C 191601 02/21/2021 02/21/2021 Books