MARC details
000 -LEADER |
fixed length control field |
02986cam a2200385 i 4500 |
001 - CONTROL NUMBER |
control field |
670601 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230531130905.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
950327s1996 nyua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
95012398 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0471128457 |
Qualifying information |
paperback |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780471117094 |
Qualifying information |
paperback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-CaTKH |
Description conventions |
rda |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S35 1996 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 SC.A 1996 G.C |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Schneier, Bruce, |
Dates associated with a name |
1963- |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Applied cryptography : |
Remainder of title |
protocols, algorithms, and source code in C / |
Statement of responsibility, etc. |
Bruce Schneier. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
New York : |
Name of producer, publisher, distributor, manufacturer |
Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice |
1996. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiii, 758 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 675-741) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword / Whitfield Diffie -- 1. Foundations -- 2. Protocol Building Blocks -- 3. Basic Protocols -- 4. Intermediate Protocols -- 5. Advanced Protocols -- 6. Esoteric Protocols -- 7. Key Length -- 8. Key Management -- 9. Algorithm Types and Modes -- 10. Using Algorithms -- 11. Mathematical Background -- 12. Data Encryption Standard (DES) -- 13. Other Block Ciphers -- 14. Still Other Block Ciphers -- 15. Combining Block Ciphers -- 16. Pseudo-Random-Sequence Generators and Stream Ciphers -- 17. Other Stream Ciphers and Real Random-Sequence Generators -- 18. One-Way Hash Functions -- 19. Public-Key Algorithms -- 20. Public-Key Digital Signature Algorithms -- 21. Identification Schemes -- 22. Key-Exchange Algorithms -- 23. Special Algorithms for Protocols -- 24. Example Implementations -- 25. Politics -- Afterword / Matt Blaze. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages - to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. -- from back cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Telecommunication |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
yomna.nassar |
Cataloging process |
P |
First Date, FD (RLIN) |
20230531 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20230531 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ocip |
f |
19 |
g |
y-gencatlg |