Cryptography breakthroughs in research and practice
"This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"--
| Corporate Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference (an imprint of IGI Global),
2020.
|
| Series: | Critical explorations.
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 02190cam a2200481 i 4500 | ||
|---|---|---|---|
| 001 | koha001013300 | ||
| 003 | OCoLC | ||
| 005 | 20250222065956.0 | ||
| 006 | m d | ||
| 007 | cr ||||||||||| | ||
| 008 | 190805s2020 paua ob 001 0 eng | ||
| 010 | |a 2019034136 | ||
| 035 | |a koha001013300 | ||
| 040 | |a DLC |b eng |e rda |c DLC |d OCLCO |d OCLCF |d YDX |d OCLCQ |d N$T | ||
| 020 | |a 1799817644 |q electronic book | ||
| 020 | |a 9781799817642 |q (electronic bk.) | ||
| 020 | |z 9781799817635 |q hardcover | ||
| 042 | |a pcc | ||
| 050 | 0 | 4 | |a TK5102.94 |b .C776 2020 |
| 082 | 0 | 0 | |a 005.8/24 |2 23 |
| 049 | |a MAIN | ||
| 245 | 0 | 0 | |a Cryptography |b breakthroughs in research and practice |c Information Resources Management Association (editor). |
| 264 | 1 | |a Hershey, PA |b Information Science Reference (an imprint of IGI Global), |c 2020. | |
| 300 | |a 1 online resource (xv, 578 pages). | ||
| 490 | 1 | |a Critical explorations | |
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a "This book examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data"-- |c Provided by publisher. | ||
| 588 | |a Description based on online resource; title from digital title page (viewed on December 20, 2019). | ||
| 653 | 0 | |a Cryptography. | |
| 653 | 0 | |a Data transmission systems |x Security measures. | |
| 653 | 0 | |a Computers |x Access control. | |
| 653 | 7 | |a Computers |x Access control. |2 fast |0 (OCoLC)fst00872779 | |
| 653 | 7 | |a Cryptography. |2 fast |0 (OCoLC)fst00884552 | |
| 653 | 7 | |a Data transmission systems |x Security measures. |2 fast |0 (OCoLC)fst00888018 | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 710 | 2 | |a Information Resources Management Association, |e editor. |9 899846 | |
| 830 | 0 | |a Critical explorations. |9 905916 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/2332377.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013300 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1013300 |d 1013300 | ||
| 039 | |||
