01310nam--2200409---450-99000117502020331620030917123353.03-540-66560-9000117502USA01000117502(ALEPH)000117502USA0100011750220030916d1999----km-y0itaa50------baengStochastic processes from physics to financeWolfgang Paul, Jorg BaschnagelBerlinSpringerCopyr. 1999XIII, 225 p.ill.26 cmProcessi stocastici519.23PaulWolfgang464842BaschnagelJorg555564990001175020203316519.23 PAU(A)0029252 CBS519.2300113638519.23 PAU0029251 CBS519.2300113851500 519.23 PAU11041 DISESBKDISESDIGIUSEPPE9020030916USA011609DIGIUSEPPE9020030916USA011615DIGIUSEPPE9020030917USA011233PATRY9020040406USA01172420121027USA01154820121027USA01160120121027USA011610Stochastic processes from physics to finance982421UNISAUSA1176704486nam 2200769Ia 450 991095397120332120200520144314.0978661107185197812810718591281071854978008050345500805034549781597491044(CKB)1000000000298111(EBL)319199(OCoLC)181421142(SSID)ssj0000074341(PQKBManifestationID)11171374(PQKBTitleCode)TC0000074341(PQKBWorkID)10119639(PQKB)10455096(Au-PeEL)EBL319199(CaPaEBR)ebr10151834(CaONFJC)MIL107185(OCoLC)162597560(PPN)170245802(OCoLC)123904759(OCoLC)ocm123904759 (FR-PaCSA)88809570(CaSebORM)1597491047(MiAaPQ)EBC319199(FRCYB88809570)88809570(EXLCZ)99100000000029811120061211d2007 uy 0engur|n|---|||||txtccrCryptography for developers /Tom St Denis, Simon Johnson1st editionRockland, MA Syngress Publishing, Inc.c20071 online resource (449 p.)Includes index.9781597491044 1597491047 Front Cover; Cryptography for Developers; Copyright Page; Contents; Preface; Chapter 1. Introduction; Introduction; Threat Models; What Is Cryptography?; Asset Management; Common Wisdom; Developer Tools; Summary; Organization; Frequently Asked Questions; Chapter 2. ASN.1 Encoding; Overview of ASN.1; ASN.1 Syntax; ASN.1 Data Types; ASN.1 Length Encodings; ASN. 1 Boolean Type; ASN.1 Integer Type; ASN.1 BIT STRING Type; ASN.1 OCTET STRING Type; ASN.1 NULL Type; ASN.1 OBJECT IDENTIFIER Type; ASN.1 SEQUENCE and SET Types; ASN.1 PrintableString and IA5STRING Types; ASN.1 UTCTIME TypeIniplementationASN.1 Length Routines; ASN.1 Primitive Encoders; Putting It All Together; Frequently Asked Questions; Chapter 3. Random Number Generation; Introduction; Measuring Entropy; How Bad Can It Be?; RNG Design; PRNG Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 4. Advanced Encryption Standard; Introduction; Implementation; Practical Attacks; Chaining Modes; Putting It All Together; Frequently Asked Questions; Chapter 5. Hash Functions; Introduction; Designs of SHS and Implementation; PKCS # 5 Key Derivation; Putting It All TogetherFrequently Asked QuestionsChapter 6. Message-Authentication Code Algorithms; Introduction; Security Guidelines; Standards; Cipher Message Authentication Code; Hash Message Authentication Code; Putting It All Together; Frequently Asked Questions; Chapter 7. Encrypt and Authenticate Modes; Introduction; Design and Implementation; Putting It All Together; Frequently Asked Questions; Chapter 8. Large Integer Arithmetic; Introduction; What Are BigNums?; The Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 9. Public Key Algorithms; IntroductionGoals of Public Key CryptographyRSA Public Key Cryptography; Elliptic Curve Cryptography; Putting It All Together; Frequently Asked Questions; IndexThe only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion onComputer softwareDevelopmentCryptographyComputer softwareDevelopment.Cryptography.005.8/2005.82005.82St. Denis Tom627563Johnson Simon125487MiAaPQMiAaPQMiAaPQBOOK9910953971203321Cryptography for developers4337924UNINA01549nam0 22003371i 450 UON0000864220231205101923.14907-515-0910-820020107d1993 |0itac50 baengGB|||| 1||||Out of Iran: One Woman's Escape from the AyatollahsSousan Azadi, Angela FerranteLondonWarner books1992 327 p. ; 20 cmDonneIranRivoluzione islamicaUONC002878FIIranStoriaRivoluzione islamicaUONC000063FIGBLondonUONL003044IRA XIIIIRAN - SOCIOLOGIAAAZADISusanUONV007669638989FERRANTEAngelaUONV007686638990Warner BooksUONV268059650ITSOL20251121RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00008642SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI IRA XIII 022 N SI SA 75166 5 022 N Iran - Storia - Rivoluzione islamicaDonne - Iran - Rivoluzione islamicaUONC000063Rivoluzione islamicaIran - Storia - Rivoluzione islamicaUONC005678Donne - Iran - Rivoluzione islamicaIran - Storia - Rivoluzione islamicaUONC002878ISLAM - IRAN - MOVIMENTI RADICALIIran - Storia - Rivoluzione islamicaUONC003399Out of Iran: One Woman's Escape from the Ayatollahs1177424UNIOR