Fundamentals of computer security
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2003
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV014283856 | ||
003 | DE-604 | ||
005 | 20050120 | ||
007 | t | ||
008 | 020506s2003 gw d||| |||| 00||| eng d | ||
016 | 7 | |a 964453185 |2 DE-101 | |
020 | |a 3540431012 |9 3-540-43101-2 | ||
035 | |a (OCoLC)248032967 | ||
035 | |a (DE-599)BVBBV014283856 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-20 |a DE-739 |a DE-573 |a DE-29T |a DE-91G |a DE-521 |a DE-522 |a DE-634 |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25P536 2003 | |
082 | 0 | |a 005.8 21 | |
082 | 0 | |a 005.8 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a 28 |2 sdnb | ||
084 | |a 17 |2 sdnb | ||
100 | 1 | |a Pieprzyk, Josef |d 1949- |e Verfasser |0 (DE-588)122464095 |4 aut | |
245 | 1 | 0 | |a Fundamentals of computer security |c Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2003 | |
300 | |a XX, 677 S. |b : graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computersicherheit - Lehrbuch | |
650 | 4 | |a Kryptologie - Lehrbuch | |
650 | 4 | |a Kryptosystem | |
650 | 4 | |a Rechnernetz - Computersicherheit | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Hardjono, Thomas |e Verfasser |4 aut | |
700 | 1 | |a Seberry, Jennifer |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009795676 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0048/09.2004 A 227 |
---|---|
DE-BY-TUM_katkey | 1478283 |
DE-BY-TUM_media_number | 040020087843 |
_version_ | 1816712432816488448 |
adam_text | Table
1
1.1
1.2
1.3
1.4
2
2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.2
2.2.1
2.2.2
2.2.3
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.3.9
2.3.10
2.4 Elements
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.5
Private-Key Cryptosystems
3.1
3.1.1
3.1.2 Affine
3.1.3
3.1.4
3.1.5 Homophonie
3.1.6
3.1.7
3.2 DES
3.2.1
3.2.2
3.2.3 DES
3.2.4 DES
3.2.5
3.3
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.4
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
3.5
3.5.1
3.5.2
3.5.3
3.6
3.6.1
3.6.2
3.6.3
3.6.4
3.6.5
3.6.6
3.7
Public-Key Cryptosystems
4.1
4.2
4.2.1
4.2.2
4.2.3
4.2.4
4.3
4.3.1
4.4
4.4.1
4.5
4.5.1
4.6
4.6.1
4.6.2
4.6.3
4.6.4
4.7
4.7.1
4.7.2
4.8
4.8.1
4.8.2
4.8.3
4.8.4
4.9
Pseudorandomness
5.1
5.2
5.3
5.3.1
5.3.2
5.4
5.5
5.6
5.7
5.8
Hashing
6.1
6.2
6.3
6.4
6.5
6.6
6.6.1
6.6.2
6.6.3
6.6.4
6.6.5
6.7
6.7.1
6.7.2
6.8
7
7.1
7.2
7.2.1
7.2.2
7.2.3
7.3
7.4
7.5
7.6
7.7
7.8
7.9
8
8.1
8.2
8.2.1
8.2.2
8.2.3
8.2.4
8.3
8.4
8.4.1
8.4.2
8.4.3
8.5
8.6
9
9.1
9.1.1
9.1.2
9.1.3
9.1.4
9.2
9.2.1
9.2.2
9.3
9.4
9.4.1
9.4.2
9.4.3
9.5
9.6
10
10.1
10.1.1
10.1.2
10.1.3
10.1.4
10.2
10.2.1
10.2.2
10.2.3
10.3
10.3.1
10.3.2
10.3.3
10.4
11
11.1
11.2
11.2.1
11.3
11.3.1 Kerberos......................................... 387
11.3.2
11.3.3
11.4
11.4.1
11.4.2
11.4.3
11.4.4
11.5
11.6
11.6.1
11.6.2
11.7
12
12.1
12.2
12.3
12.4
12.4.1
12.4.2
12.4.3
12.5
13
13.1
13.2
13.3
13.3.1
13.3.2
13.4
13.4.1
13.4.2
13.5
13.5.1
13.5.2
13.5.3
13.6
13.6.1 Schnorr
13.6.2
13.6.3
13.7 Problems
14
14.1
14.2
14.2.1
14.2.2
14.2.3
14.3
14.4
14.4.1
14.4.2
14.5
14.6
14.6.1
14.6.2
14.6.3
14.7
14.7.1
14.7.2
14.7.3
14.7.4
14.8
14.8.1
14.8.2
14.9
14.10
14.11
15
15.1
15.1.1
15.1.2
15.1.3
15.1.4
15.1.5
15.2
15.2.1
15.2.2
15.2.3
15.2.4
15.2.5
15.3
16
16.1
16.2
16.3
16.3.1
16.4
16.4.1
16.5
16.5.1
16.5.2
16.5.3
16.6
16.7
16.8
16.9
16.9.1
16.9.2
16.9.3
17
17.1
17.1.1
17.1.2
17.2
17.2.1
17.2.2
17.3
17.4
17.4.1
17.4.2
17.4.3
17.4.4
17.4.5
18
18.1
18.1.1
18.1.2
18.1.3
18.1.4
18.1.5
18.2
18.2.1
18.2.2
18.2.3
18.2.4
18.2.5
18.2.6
18.3
18.3.1
18.3.2
18.3.3
18.3.4
18.3.5
18.3.6
18.3.7
18.3.8
References
Index
|
any_adam_object | 1 |
author | Pieprzyk, Josef 1949- Hardjono, Thomas Seberry, Jennifer |
author_GND | (DE-588)122464095 |
author_facet | Pieprzyk, Josef 1949- Hardjono, Thomas Seberry, Jennifer |
author_role | aut aut aut |
author_sort | Pieprzyk, Josef 1949- |
author_variant | j p jp t h th j s js |
building | Verbundindex |
bvnumber | BV014283856 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25P536 2003 |
callnumber-search | QA76.9.A25P536 2003 |
callnumber-sort | QA 276.9 A25 P536 42003 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 ST 276 ST 277 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)248032967 (DE-599)BVBBV014283856 |
dewey-full | 005.821 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 21 005.8 |
dewey-search | 005.8 21 005.8 |
dewey-sort | 15.8 221 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02389nam a2200649 c 4500</leader><controlfield tag="001">BV014283856</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20050120 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020506s2003 gw d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">964453185</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540431012</subfield><subfield code="9">3-540-43101-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248032967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014283856</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25P536 2003</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 21</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">17</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pieprzyk, Josef</subfield><subfield code="d">1949-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122464095</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals of computer security</subfield><subfield code="c">Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XX, 677 S.</subfield><subfield code="b">: graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit - Lehrbuch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie - Lehrbuch</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptosystem</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Computersicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hardjono, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seberry, Jennifer</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009795676</subfield></datafield></record></collection> |
id | DE-604.BV014283856 |
illustrated | Illustrated |
indexdate | 2024-11-25T17:26:05Z |
institution | BVB |
isbn | 3540431012 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009795676 |
oclc_num | 248032967 |
open_access_boolean | |
owner | DE-20 DE-739 DE-573 DE-29T DE-91G DE-BY-TUM DE-521 DE-522 DE-634 DE-83 DE-11 |
owner_facet | DE-20 DE-739 DE-573 DE-29T DE-91G DE-BY-TUM DE-521 DE-522 DE-634 DE-83 DE-11 |
physical | XX, 677 S. : graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer |
record_format | marc |
spellingShingle | Pieprzyk, Josef 1949- Hardjono, Thomas Seberry, Jennifer Fundamentals of computer security Computersicherheit - Lehrbuch Kryptologie - Lehrbuch Kryptosystem Rechnernetz - Computersicherheit Computer security Cryptography Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4033329-2 |
title | Fundamentals of computer security |
title_auth | Fundamentals of computer security |
title_exact_search | Fundamentals of computer security |
title_full | Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
title_fullStr | Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
title_full_unstemmed | Fundamentals of computer security Josef Pieprzyk ; Thomas Hardjono ; Jennifer Seberry |
title_short | Fundamentals of computer security |
title_sort | fundamentals of computer security |
topic | Computersicherheit - Lehrbuch Kryptologie - Lehrbuch Kryptosystem Rechnernetz - Computersicherheit Computer security Cryptography Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computersicherheit - Lehrbuch Kryptologie - Lehrbuch Kryptosystem Rechnernetz - Computersicherheit Computer security Cryptography Computersicherheit Rechnernetz Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009795676&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pieprzykjosef fundamentalsofcomputersecurity AT hardjonothomas fundamentalsofcomputersecurity AT seberryjennifer fundamentalsofcomputersecurity |