000 | nam a22 7a 4500 | ||
---|---|---|---|
999 |
_c72036 _d72036 |
||
003 | FUTML | ||
005 | 20240613120032.0 | ||
008 | 240613s2023 UK p|||fr|||| 001 0 eng d | ||
010 | _a 2019741373 | ||
020 | _a9781292437484 | ||
024 | 7 |
_a10.1007/978-3-319-07536-5 _2doi |
|
035 | _a(DE-He213)978-3-319-07536-5 | ||
037 | _aB-0048011-004812 | ||
040 |
_aDLC _beng _eRDA _erda _cDLC _dFUTML |
||
050 |
_aTK5105.59 _b.S73 |
||
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 |
_aStalling, W. _e(Author) _qWilliam Stalling _936316 |
||
245 | 0 | 0 |
_aCryptography and Network Security : _bPrinciples and Practices/ _cBy William Stalling.- _h(Print resources) |
250 | _a8th ed.- | ||
260 |
_aUnited Kingdom: _bPeason Education Limited, _cc2023 |
||
300 |
_a832p.: _billus. _c25cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
504 | _aIncludes index | ||
588 | _aDescription based on publisher-supplied MARC data. | ||
590 | _aB-0048001-0048012/SABA/13/06/2023 | ||
650 | 0 |
_aComputer security. _96556 |
|
650 | 0 |
_aData encryption (Computer science). _911645 |
|
650 | 0 |
_aComputers. _9589 |
|
650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 _933106 |
650 | 2 | 4 |
_aCryptology. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28020 _936317 |
650 | 2 | 4 |
_aTheory of Computation. _0https://scigraph.springernature.com/ontologies/product-market-codes/I16005 _936318 |
906 |
_a0 _bibc _corigres _du _encip _f20 _gy-gencatlg |
||
912 |
_aDR. SABA _bDR. SABA _cDR. SABA |
||
942 |
_2lcc _cBKS |
||
949 |
_aIBB LIBRARY GIDAN KWANO _cTK5105.59.S73 _d.S73 _n2 |