| 000 | 01156cam a2200349 i 4500 | ||
|---|---|---|---|
| 001 | 19601558 | ||
| 005 | 20250919120550.0 | ||
| 008 | 170418s2015 inua b 001 0 eng | ||
| 010 | _a 2015932956 | ||
| 020 |
_a9781119096726 _qhbk |
||
| 035 | _a19601558 | ||
| 040 |
_aDDC _beng _erda _cDLC _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bS35 2015 |
| 082 | 0 | 0 |
_a005.824 _223 |
| 100 | 1 |
_aSchneier, Bruce, _d1963- _eauthor. |
|
| 245 | 1 | 0 |
_aApplied cryptography : _bprotocols, algorithms, and source code in C / _cBruce Schneier. |
| 250 | _a20th anniversary edition. | ||
| 264 | 1 |
_aIndianapolis, IN : _bWiley, _c[2015] |
|
| 300 |
_axxv, 758 pages : _billustrations ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 365 |
_cUS$ _d72.95 |
||
| 504 | _aIncludes bibliographical references (pages 675-741) and index. | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aTelecommunication _xSecurity measures. |
|
| 650 | 0 | _aCryptography. | |
| 906 |
_a7 _bcbc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK _n0 |
||
| 999 |
_c8115 _d8115 |
||