Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Applied cryptography for cyber secur...
~
Nemati, Hamid R., (1958-)
Linked to FindBook
Google Book
Amazon
博客來
Applied cryptography for cyber security and defense = information encryption and cyphering /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Applied cryptography for cyber security and defense/ Hamid R. Nemati and Li Yang, editors.{me_controlnum}
Reminder of title:
information encryption and cyphering /
other author:
Nemati, Hamid R.,
Published:
Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), : c2011.,
Description:
xxii, 383 p. :ill. ;29 cm.
Subject:
Telecommunication - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-783-1
ISBN:
9781615207848 (ebook)
Applied cryptography for cyber security and defense = information encryption and cyphering /
Applied cryptography for cyber security and defense
information encryption and cyphering /[electronic resource] :Hamid R. Nemati and Li Yang, editors.{me_controlnum} - Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),c2011. - xxii, 383 p. :ill. ;29 cm.
Includes bibliographical references.
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781615207848 (ebook)Subjects--Topical Terms:
540556
Telecommunication
--Security measures.Subjects--Index Terms:
Network security
LC Class. No.: TK5102.94 / .A67 2011e
Dewey Class. No.: 005.8/2
Applied cryptography for cyber security and defense = information encryption and cyphering /
LDR
:01684nmm 2200373 a 4500
001
1032822
003
IGIG
005
20111118134511.0
008
120420s2011 paua fsb 000 0 eng d
010
$z
2009052433
020
$a
9781615207848 (ebook)
020
$a
9781615207831 (hardcover)
035
$a
(CaBNvSL)gtp00544793
035
$a
00000338
040
$a
CaBNvSL
$c
CaBNvSL
$d
CaBNvSL
050
4
$a
TK5102.94
$b
.A67 2011e
082
0 4
$a
005.8/2
$2
22
245
0 0
$a
Applied cryptography for cyber security and defense
$h
[electronic resource] :
$b
information encryption and cyphering /
$c
Hamid R. Nemati and Li Yang, editors.{me_controlnum}
260
$a
Hershey, Pa. :
$b
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
$c
c2011.
300
$a
xxii, 383 p. :
$b
ill. ;
$c
29 cm.
504
$a
Includes bibliographical references.
520
3
$a
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Telecommunication
$x
Security measures.
$3
540556
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Cryptography.
$3
532586
653
$a
Network security
653
$a
Cryptography-based authentication
653
$a
E-mail services and Web services
653
$a
Wireless sensor networks
653
$a
E-commerce
653
$a
Pervasive computing environments
653
$a
Steganography
653
$a
Secure electronic voting
653
$a
Biometric security
653
$a
Applied cryptography
700
1
$a
Nemati, Hamid R.,
$d
1958-
$3
876613
700
1
$a
Yang, Li,
$d
1974 Oct. 29-
$3
1361662
710
2
$a
IGI Global.
$3
1361470
776
0
$c
(Original)
$z
161520783X
$z
9781615207831
$w
(DLC) 2009052433
856
4 8
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-783-1
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9134031
電子資源
11.線上閱覽_V
電子書
EB TK5102.94 .A67 2011e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login