LEADER 01102nam a2200277 i 4500 001 991001696409707536 005 20020503124651.0 008 001023s1984 uk ||| | eng 020 $a019281480X 035 $ab10259302-39ule_inst 035 $aLE01283073$9ExL 040 $aDip.to Lingue$bita 100 1 $aJohnstone, Richard$0169022 245 14$aThe will to believe:novelists of the nineteen-thirties /$cRichard Johnstone 260 $aOxford; New York :$bOxford University Press,$cc1984 300 $aviii144 p. ;$c23 cm. 500 $aIncludes bibliographical references and index 650 4$aGran Bretagna$xStoria - Giorgio 4 650 4$aGran Bretagna$xStoria - Giorgio 5 650 4$aNarratori religiosi - Inghilterra$xStoria e critica 907 $a.b10259302$b21-09-06$c27-06-02 912 $a991001696409707536 945 $aLE012 823.910 9 JOH$g1$i2012000020641$lle012$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10309809$z27-06-02 996 $aWill to believe:novelists of the nineteen-thirties$9211232 997 $aUNISALENTO 998 $ale012$b01-01-00$cm$da $e-$feng$guk $h4$i1 LEADER 03147nam 2200637 450 001 9910784149503321 005 20230125202059.0 010 $a1-58053-956-4 035 $a(CKB)1000000000340612 035 $a(EBL)227658 035 $a(OCoLC)437145937 035 $a(SSID)ssj0000266048 035 $a(PQKBManifestationID)11205380 035 $a(PQKBTitleCode)TC0000266048 035 $a(PQKBWorkID)10304892 035 $a(PQKB)11230038 035 $a(Au-PeEL)EBL227658 035 $a(CaPaEBR)ebr10082005 035 $a(CaBNVSL)mat09101038 035 $a(IEEE)9101038 035 $a(MiAaPQ)EBC227658 035 $a(EXLCZ)991000000000340612 100 $a20200729d2004 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aUser's guide to cryptography and standards /$fAlexander W. Dent, Chris J. Mitchell 210 1$aBoston, Massachusetts :$cArtech House,$d2004. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2004] 215 $a1 online resource (398 p.) 225 1 $aArtech House computer security library 300 $aDescription based upon print version of record. 311 $a1-58053-530-5 320 $aIncludes bibliographical references and index. 327 $aStandards and the standardization process -- Security mechanisms and security services -- Encryption -- Modes of operation for block ciphers -- Cryptographic hash functions -- Message authentication codes (MAC)s -- Digital signatures -- Non-repudiation mechanisms -- Authentication protocols -- Key management frameworks --Key establishment mechanisms -- Public key infrastructures -- Trusted third parties -- Cryptographic APIs -- Other standards -- Standards : the future. 330 3 $aWith the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized cryptographic techniques to help you protect your data and computing resources to the fullest. Rather than focusing on theory like other books on the market, this unique resource describes cryptography from an end-user perspective, presenting in-depth, highly practical comparisons of standards and techniques.$cPublisher abstract. 410 0$aArtech House computer security library. 410 0$aArtech House computer security series. 606 $aComputer security 606 $aCryptography$xStandards 606 $aComputers$xAccess control$xStandards 615 0$aComputer security. 615 0$aCryptography$xStandards. 615 0$aComputers$xAccess control$xStandards. 676 $a005.8 700 $aDent$b Alexander W.$01569019 701 $aMitchell$b Chris J$01569020 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910784149503321 996 $aUser's guide to cryptography and standards$93841582 997 $aUNINA