|
|
|
|
LEADER |
01411cam a2200301 a 4500 |
001 |
25654 |
003 |
DLC |
005 |
20130606081841.0 |
008 |
100105s2011 paua b 001 0 eng |
010 |
# |
# |
|a 2009052433
|
020 |
# |
# |
|a 9781615207831 (hardcover)
|
020 |
# |
# |
|a 9781615207848 (ebook)
|
040 |
# |
# |
|a DLC
|c DLC
|d DLC
|
042 |
# |
# |
|a pcc
|
050 |
# |
# |
|a TK5102.94
|b .A67 2011
|
082 |
# |
# |
|a 005.8/2
|2 22
|
245 |
# |
# |
|a Applied cryptography for cyber security and defense
|b information encryption and cyphering
|c Hamid R. Nemati and Li Yang, editors
|
260 |
# |
# |
|a Hershey, PA
|b Information Science Reference,
|c c2011
|
300 |
# |
# |
|a xxii, 383 p.
|b ill.
|c 29 cm
|
504 |
# |
# |
|a Includes bibliographical references (p. 338-366) and index
|
520 |
# |
# |
|a "This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.
|
650 |
# |
# |
|a Telecommunication
|x Security measures
|
650 |
# |
# |
|a Data encryption (Computer science)
|
650 |
# |
# |
|a Cryptography
|
700 |
# |
# |
|a Nemati, Hamid R.
|d 1958-
|
700 |
# |
# |
|a Yang, Li
|d 1974 October 29-
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-783-1
|z View fulltext via EzAccess
|