Introduction to cryptography with Java applets -(E-BOOK) (Record no. 192387)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01371 a2200217 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Nust |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20170207154036.0 |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2002034167 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0763722073 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | Nust |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Bishop, David, |
| 245 10 - TITLE STATEMENT | |
| Title | Introduction to cryptography with Java applets -(E-BOOK) |
| Statement of responsibility, etc. | David Bishop. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston : |
| Name of publisher, distributor, etc. | Jones and Bartlett, |
| Date of publication, distribution, etc. | 2003. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvi, 370 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter 1: A History of Cryptography (Page-1), Chapter 2: Large Integer Computing (Page-33), Chapter 3: The Integers (Page-65), Chapter 4: Linear Diophantine Equations and Linear Congruences (Page-89), Chapter 5: Linear Ciphers (Page-105), Chapter 6: Systems of Linear Congruences—Single Modulus (Page-125), Chapter 7: Matrix Ciphers (Page-143), Chapter 8: Systems of Linear Congruences—Multiple Moduli (Page-161), Chapter 9: Quadratic Congruences (Page-169), Chapter 10: Quadratic Ciphers (Page-181), Chapter 11: Primality Testing (Page-213), Chapter 12: Factorization Techniques (Page-221), Chapter 13: Exponential Congruences (Page-235), Chapter 14: Exponential Ciphers (Page-259), Chapter 15: Establishing Keys and Message Exchange(Page- 279), Chapter 16: Cryptographic Applications (Page-299).v |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Cryptography. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Java (Computer program language) |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | E-BOOK |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | 12/12/2016 | 005.8 BIS | MCSEB-1276 | 12/08/2016 | 12/12/2016 | Book |
