Protecting information : (Record no. 268)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 090323s2006 enka b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2006002404 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 052182740X |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u1237 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 004.1 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Loepp, Susan. |
| 9 (RLIN) | 963 |
| 245 10 - TITLE STATEMENT | |
| Title | Protecting information : |
| Remainder of title | from classical error correction to quantum cryptography / |
| Statement of responsibility, etc. | Susan Loepp, William K. Wootters. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Cambridge ; |
| -- | New York : |
| Name of publisher, distributor, etc. | Cambridge University Press, |
| Date of publication, distribution, etc. | 2006. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xv, 287 p. : |
| Other physical details | ill. ; |
| Dimensions | 25 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references (p. 277-284) and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | 1. Cryptography: an overview; 2. Quantum mechanics; 3. Quantum cryptography; 4. An introduction to error-correcting codes; 5. Quantum cryptography revisited; 6. Generalized Reed-Solomon codes; 7. Quantum computing; Appendi |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the potential impacts of quantum physics: (i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices. |
| 596 ## - | |
| -- | 1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | CIT. |
| 9 (RLIN) | 14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Quantum computers. |
| 9 (RLIN) | 503 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 964 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Wootters, William Kent. |
| 9 (RLIN) | 965 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 004.1 / LO.P 2006 | 002560 | 11/24/2019 | 1 | 11/24/2019 | Books |