Codes : (Record no. 109)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090202s2008 enka b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008930146
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1848002726
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u1091
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 003.54
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Biggs, Norman.
9 (RLIN) 376
245 10 - TITLE STATEMENT
Title Codes :
Remainder of title an introduction to information communication and cryptography /
Statement of responsibility, etc. Norman L. Biggs.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. London :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent x, 273 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Springer undergraduate mathematics series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Coding and its uses -- 2. Prefix-free codes -- 3. Economical coding -- 4. Data compression -- 5. Noisy channels -- 6. The problem of reliable communication -- 7. The noisy coding theorems -- 8. Linear codes -- 9. Algebraic coding theory -- 10. Coding natural languages -- 11. The development of cryptography -- 12. Cryptography in theory and practice -- 13. The RSA cryptosystem -- 14. Cryptography and calculation -- 15. Elliptic curve cryptography.
520 ## - SUMMARY, ETC.
Summary, etc. This book is an integrated introduction to the mathematics of coding, that is, replacing information expressed in symbols, such as a natural language or a sequence of bits, by another message using (possibly) different symbols. There are three main reasons for doing this: economy, reliability, and security, and each is covered in detail. Only a modest mathematical background is assumed, the mathematical theory being introduced at a level that enables the basic problems to be stated carefully, but without unnecessary abstraction.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Coding theory.
9 (RLIN) 377
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 378
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   003.54 / BI.C 2008 001367 11/24/2019 1 11/24/2019 Books
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   003.54 / BI.C 2008 001991 11/24/2019 2 11/24/2019 Books