Fundamentals of computer security

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Pieprzyk, Josef 1949- (VerfasserIn), Hardjono, Thomas (VerfasserIn), Seberry, Jennifer (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2003
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV014283856
003 DE-604
005 20050120
007 t
008 020506s2003 gw d||| |||| 00||| eng d
016 7 |a 964453185  |2 DE-101 
020 |a 3540431012  |9 3-540-43101-2 
035 |a (OCoLC)248032967 
035 |a (DE-599)BVBBV014283856 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-20  |a DE-739  |a DE-573  |a DE-29T  |a DE-91G  |a DE-521  |a DE-522  |a DE-634  |a DE-83  |a DE-11 
050 0 |a QA76.9.A25P536 2003 
082 0 |a 005.8 21 
082 0 |a 005.8 
084 |a ST 273  |0 (DE-625)143640:  |2 rvk 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a DAT 460f  |2 stub 
084 |a 28  |2 sdnb 
084 |a 17  |2 sdnb 
100 1 |a Pieprzyk, Josef  |d 1949-  |e Verfasser  |0 (DE-588)122464095  |4 aut 
245 1 0 |a Fundamentals of computer security  |c Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry 
264 1 |a Berlin [u.a.]  |b Springer  |c 2003 
300 |a XX, 677 S.  |b : graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 4 |a Computersicherheit - Lehrbuch 
650 4 |a Kryptologie - Lehrbuch 
650 4 |a Kryptosystem 
650 4 |a Rechnernetz - Computersicherheit 
650 4 |a Computer security 
650 4 |a Cryptography 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 1 |5 DE-604 
689 2 0 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 2 |5 DE-604 
689 3 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 3 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 3 |5 DE-604 
700 1 |a Hardjono, Thomas  |e Verfasser  |4 aut 
700 1 |a Seberry, Jennifer  |e Verfasser  |4 aut 
856 4 2 |m Digitalisierung UB Passau  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
999 |a oai:aleph.bib-bvb.de:BVB01-009795676 

Datensatz im Suchindex

DE-BY-TUM_call_number 0048/09.2004 A 227
DE-BY-TUM_katkey 1478283
DE-BY-TUM_media_number 040020087843
_version_ 1816712432816488448
adam_text Table 1 1.1 1.2 1.3 1.4 2 2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.2 2.2.1 2.2.2 2.2.3 2.3 2.3.1 2.3.2 2.3.3 2.3.4 2.3.5 2.3.6 2.3.7 2.3.8 2.3.9 2.3.10 2.4 Elements 2.4.1 2.4.2 2.4.3 2.4.4 2.4.5 2.5 Private-Key Cryptosystems 3.1 3.1.1 3.1.2 Affine 3.1.3 3.1.4 3.1.5 Homophonie 3.1.6 3.1.7 3.2 DES 3.2.1 3.2.2 3.2.3 DES 3.2.4 DES 3.2.5 3.3 3.3.1 3.3.2 3.3.3 3.3.4 3.3.5 3.3.6 3.4 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5 3.5 3.5.1 3.5.2 3.5.3 3.6 3.6.1 3.6.2 3.6.3 3.6.4 3.6.5 3.6.6 3.7 Public-Key Cryptosystems 4.1 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.3 4.3.1 4.4 4.4.1 4.5 4.5.1 4.6 4.6.1 4.6.2 4.6.3 4.6.4 4.7 4.7.1 4.7.2 4.8 4.8.1 4.8.2 4.8.3 4.8.4 4.9 Pseudorandomness 5.1 5.2 5.3 5.3.1 5.3.2 5.4 5.5 5.6 5.7 5.8 Hashing 6.1 6.2 6.3 6.4 6.5 6.6 6.6.1 6.6.2 6.6.3 6.6.4 6.6.5 6.7 6.7.1 6.7.2 6.8 7 7.1 7.2 7.2.1 7.2.2 7.2.3 7.3 7.4 7.5 7.6 7.7 7.8 7.9 8 8.1 8.2 8.2.1 8.2.2 8.2.3 8.2.4 8.3 8.4 8.4.1 8.4.2 8.4.3 8.5 8.6 9 9.1 9.1.1 9.1.2 9.1.3 9.1.4 9.2 9.2.1 9.2.2 9.3 9.4 9.4.1 9.4.2 9.4.3 9.5 9.6 10 10.1 10.1.1 10.1.2 10.1.3 10.1.4 10.2 10.2.1 10.2.2 10.2.3 10.3 10.3.1 10.3.2 10.3.3 10.4 11 11.1 11.2 11.2.1 11.3 11.3.1 Kerberos......................................... 387 11.3.2 11.3.3 11.4 11.4.1 11.4.2 11.4.3 11.4.4 11.5 11.6 11.6.1 11.6.2 11.7 12 12.1 12.2 12.3 12.4 12.4.1 12.4.2 12.4.3 12.5 13 13.1 13.2 13.3 13.3.1 13.3.2 13.4 13.4.1 13.4.2 13.5 13.5.1 13.5.2 13.5.3 13.6 13.6.1 Schnorr 13.6.2 13.6.3 13.7 Problems 14 14.1 14.2 14.2.1 14.2.2 14.2.3 14.3 14.4 14.4.1 14.4.2 14.5 14.6 14.6.1 14.6.2 14.6.3 14.7 14.7.1 14.7.2 14.7.3 14.7.4 14.8 14.8.1 14.8.2 14.9 14.10 14.11 15 15.1 15.1.1 15.1.2 15.1.3 15.1.4 15.1.5 15.2 15.2.1 15.2.2 15.2.3 15.2.4 15.2.5 15.3 16 16.1 16.2 16.3 16.3.1 16.4 16.4.1 16.5 16.5.1 16.5.2 16.5.3 16.6 16.7 16.8 16.9 16.9.1 16.9.2 16.9.3 17 17.1 17.1.1 17.1.2 17.2 17.2.1 17.2.2 17.3 17.4 17.4.1 17.4.2 17.4.3 17.4.4 17.4.5 18 18.1 18.1.1 18.1.2 18.1.3 18.1.4 18.1.5 18.2 18.2.1 18.2.2 18.2.3 18.2.4 18.2.5 18.2.6 18.3 18.3.1 18.3.2 18.3.3 18.3.4 18.3.5 18.3.6 18.3.7 18.3.8 References Index
any_adam_object 1
author Pieprzyk, Josef 1949-
Hardjono, Thomas
Seberry, Jennifer
author_GND (DE-588)122464095
author_facet Pieprzyk, Josef 1949-
Hardjono, Thomas
Seberry, Jennifer
author_role aut
aut
aut
author_sort Pieprzyk, Josef 1949-
author_variant j p jp
t h th
j s js
building Verbundindex
bvnumber BV014283856
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25P536 2003
callnumber-search QA76.9.A25P536 2003
callnumber-sort QA 276.9 A25 P536 42003
callnumber-subject QA - Mathematics
classification_rvk ST 273
ST 276
ST 277
classification_tum DAT 460f
ctrlnum (OCoLC)248032967
(DE-599)BVBBV014283856
dewey-full 005.821
005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8 21
005.8
dewey-search 005.8 21
005.8
dewey-sort 15.8 221
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02389nam a2200649 c 4500</leader><controlfield tag="001">BV014283856</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20050120 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020506s2003 gw d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">964453185</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540431012</subfield><subfield code="9">3-540-43101-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248032967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014283856</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25P536 2003</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 21</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">17</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pieprzyk, Josef</subfield><subfield code="d">1949-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122464095</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals of computer security</subfield><subfield code="c">Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 677 S.</subfield><subfield code="b">: graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit - Lehrbuch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie - Lehrbuch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptosystem</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Computersicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hardjono, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seberry, Jennifer</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=009795676&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009795676</subfield></datafield></record></collection>
id DE-604.BV014283856
illustrated Illustrated
indexdate 2024-11-25T17:26:05Z
institution BVB
isbn 3540431012
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-009795676
oclc_num 248032967
open_access_boolean
owner DE-20
DE-739
DE-573
DE-29T
DE-91G
DE-BY-TUM
DE-521
DE-522
DE-634
DE-83
DE-11
owner_facet DE-20
DE-739
DE-573
DE-29T
DE-91G
DE-BY-TUM
DE-521
DE-522
DE-634
DE-83
DE-11
physical XX, 677 S. : graph. Darst.
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher Springer
record_format marc
spellingShingle Pieprzyk, Josef 1949-
Hardjono, Thomas
Seberry, Jennifer
Fundamentals of computer security
Computersicherheit - Lehrbuch
Kryptologie - Lehrbuch
Kryptosystem
Rechnernetz - Computersicherheit
Computer security
Cryptography
Kryptosystem (DE-588)4209132-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4209132-9
(DE-588)4274324-2
(DE-588)4070085-9
(DE-588)4033329-2
title Fundamentals of computer security
title_auth Fundamentals of computer security
title_exact_search Fundamentals of computer security
title_full Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry
title_fullStr Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry
title_full_unstemmed Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry
title_short Fundamentals of computer security
title_sort fundamentals of computer security
topic Computersicherheit - Lehrbuch
Kryptologie - Lehrbuch
Kryptosystem
Rechnernetz - Computersicherheit
Computer security
Cryptography
Kryptosystem (DE-588)4209132-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptologie (DE-588)4033329-2 gnd
topic_facet Computersicherheit - Lehrbuch
Kryptologie - Lehrbuch
Kryptosystem
Rechnernetz - Computersicherheit
Computer security
Cryptography
Computersicherheit
Rechnernetz
Kryptologie
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT pieprzykjosef fundamentalsofcomputersecurity
AT hardjonothomas fundamentalsofcomputersecurity
AT seberryjennifer fundamentalsofcomputersecurity