<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01371    a2200217   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20170207154036.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2002034167</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">0763722073</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.8</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Bishop, David,</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Introduction to cryptography with Java applets -(E-BOOK)</subfield>
    <subfield code="c">David Bishop.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boston :</subfield>
    <subfield code="b">Jones and Bartlett,</subfield>
    <subfield code="c">2003.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xvi, 370 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Chapter 1: A History of Cryptography (Page-1), Chapter 2: Large Integer Computing (Page-33), Chapter 3: The Integers (Page-65), Chapter 4: Linear Diophantine Equations and Linear Congruences (Page-89), Chapter 5: Linear Ciphers (Page-105), Chapter 6: Systems of Linear Congruences&#x2014;Single Modulus (Page-125), Chapter 7: Matrix Ciphers (Page-143), Chapter 8: Systems of Linear Congruences&#x2014;Multiple Moduli (Page-161), Chapter 9: Quadratic Congruences (Page-169), Chapter 10: Quadratic Ciphers (Page-181), Chapter 11: Primality Testing (Page-213), Chapter 12: Factorization Techniques (Page-221), Chapter 13: Exponential Congruences (Page-235), Chapter 14: Exponential Ciphers (Page-259), Chapter 15: Establishing Keys and Message Exchange(Page- 279), Chapter 16: Cryptographic Applications (Page-299).v</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Cryptography.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Java (Computer program language)</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="a">E-BOOK</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">BK</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">192387</subfield>
    <subfield code="d">192387</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">NFIC</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8   BIS</subfield>
    <subfield code="p">MCSEB-1276</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
  </datafield>
</record>
