Cryptology unlocked / (Record no. 1368)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 080319s2007 enka b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2007008058 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780470060643 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u226 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.82 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Wobst, Reinhard. |
| 9 (RLIN) | 4024 |
| 245 10 - TITLE STATEMENT | |
| Title | Cryptology unlocked / |
| Statement of responsibility, etc. | Reinhard Wobst ; translated by Angelika Shafir. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Chichester ; |
| -- | Hoboken, NJ : |
| Name of publisher, distributor, etc. | John Wiley & Sons, |
| Date of publication, distribution, etc. | c2007. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xiii, 540 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 500 ## - GENERAL NOTE | |
| General note | First published in the German language under the title "Abenteuer Kryptologie" by Addison-Wesley"--T.p. verso. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references (p. 515-526) and index. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | 1. Introduction. 2. Cryptology from the Romans to World War II. 3. Cryptanalysis in Detail. 4. Development Milestones: DES, RSA. 5. Life After DES: New Methods, New Attacks. 6. Cryptographic Protocols. 7. Practical Applications. 8. Cryptology, Politics, and Business. Glossary. Appendix A.1. Sources of Information. Appendix A.2. Bibliography. Index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Cryptology Unlocked introduces cryptography in a unique and non-mathematical style. Renowned security author, Reinhard Wobst explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Cryptology Unlocked contains everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way. |
| 596 ## - | |
| -- | 1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | CIT. |
| 9 (RLIN) | 14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computers |
| General subdivision | Access control. |
| 9 (RLIN) | 4025 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Data protection. |
| 9 (RLIN) | 4026 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Cryptography. |
| 9 (RLIN) | 378 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.82 / WO.C 2007 | 000533 | 11/24/2019 | 1 | 11/24/2019 | Books |