|
|
|
|
LEADER |
00960nam a22003018i 4500 |
001 |
180-019897736 |
003 |
Uk |
005 |
20200825170023.0 |
008 |
200817s2020 flu 000|0|eng|d |
007 |
tu |
015 |
|
|
|a GBC0C4578
|2 bnb
|
016 |
7 |
|
|a 019897736
|2 Uk
|
020 |
|
|
|a 9780367657208 (pbk.) :
|c £42.99
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|e rda
|
082 |
0 |
4 |
|a 005.824
|2 23
|
100 |
1 |
|
|a Stapleton, Jeffrey James
|e author.
|
245 |
1 |
0 |
|a Security without obscurity
|p A guide to cryptographic architectures /
|c Jeff Stapleton
|
246 |
3 |
0 |
|a Guide to cryptographic architectures
|
263 |
|
|
|a 202009
|
264 |
|
1 |
|a Boca Raton
|b Auerbach
|c 2020
|
300 |
|
|
|a 1 volume ;
|c 24 cm
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a unmediated
|2 rdamedia
|
338 |
|
|
|a volume
|2 rdacarrier
|
650 |
|
0 |
|a Telecommunication
|x Security measures.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer network architectures.
|
980 |
|
|
|a 019897736
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1778756570111279104 |
access_facet |
Local Holdings |
author |
Stapleton, Jeffrey James |
author_facet |
Stapleton, Jeffrey James |
author_role |
aut |
author_sort |
Stapleton, Jeffrey James |
author_variant |
j j s jj jjs |
building |
Library A |
callnumber-sort |
|
collection |
sid-180-col-bnbfidbbi |
dewey-full |
005.824 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.824 |
dewey-search |
005.824 |
dewey-sort |
15.824 |
dewey-tens |
000 - Computer science, knowledge & systems |
facet_avail |
Local |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-019897736 |
illustrated |
Not Illustrated |
imprint |
Boca Raton, Auerbach, 2020 |
imprint_str_mv |
Boca Raton Auerbach 2020 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9780367657208 (pbk.) : |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:34:15.69Z |
match_str |
stapleton2020securitywithoutobscurity |
mega_collection |
British National Bibliography |
physical |
1 volume; 24 cm |
publishDate |
2020 |
publishDateSort |
2020 |
publishPlace |
Boca Raton |
publisher |
Auerbach |
record_format |
marcfinc |
record_id |
019897736 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
180 |
spelling |
Stapleton, Jeffrey James author., Security without obscurity A guide to cryptographic architectures / Jeff Stapleton, Guide to cryptographic architectures, 202009, Boca Raton Auerbach 2020, 1 volume ; 24 cm, text rdacontent, unmediated rdamedia, volume rdacarrier, Telecommunication Security measures., Data encryption (Computer science), Computer network architectures. |
spellingShingle |
Stapleton, Jeffrey James, Security without obscurity, Telecommunication Security measures., Data encryption (Computer science), Computer network architectures. |
title |
Security without obscurity |
title_alt |
Guide to cryptographic architectures |
title_auth |
Security without obscurity |
title_full |
Security without obscurity A guide to cryptographic architectures / Jeff Stapleton |
title_fullStr |
Security without obscurity A guide to cryptographic architectures / Jeff Stapleton |
title_full_unstemmed |
Security without obscurity A guide to cryptographic architectures / Jeff Stapleton |
title_list_str |
A guide to cryptographic architectures / |
title_part_str |
A guide to cryptographic architectures / |
title_short |
Security without obscurity |
title_sort |
security without obscurity a guide to cryptographic architectures |
topic |
Telecommunication Security measures., Data encryption (Computer science), Computer network architectures. |
topic_facet |
Telecommunication, Data encryption (Computer science), Computer network architectures., Security measures. |