000 -LEADER | |
---|---|
fixed length control field | 04810cam a22004454a 4500 |
001 - CONTROL NUMBER | |
control field | 00049929 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | AE-DuAU |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20241127164351.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 050915s2001 nyua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 00049929 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0471405744 : |
Terms of availability | 29.99 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Transcribing agency | DLC |
Modifying agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | G68 2001 |
069 ## - | |
-- | 09501184 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC) | |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | QA 76.9 .A25 G68 2001 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC) | |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) | QA 76.9 .A25 G68 2001 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Graff, Jon. |
9 (RLIN) | 20936 |
245 10 - TITLE STATEMENT | |
Title | Cryptography and e-commerce : |
Remainder of title | a Wiley tech brief / |
Statement of responsibility, etc | Jon C. Graff. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New York : |
Name of publisher, distributor, etc | John Wiley, |
Date of publication, distribution, etc | 2001. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xviii, 222 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
336 ## - CONTENT TYPE | |
Source | rdacontent |
Content Type Term | text |
Content Type Code | txt |
337 ## - MEDIA TYPE | |
Source | rdamedia |
Media Type Term | unmediated |
Media Type Code | n |
338 ## - CARRIER TYPE | |
Source | rdacarrier |
Carrier Type Term | volume |
Carrier Type Code | nc |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE | |
Title | Wiley tech brief series |
9 (RLIN) | 73632 |
500 ## - GENERAL NOTE | |
General note | "Wiley Computer Publishing." |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references (p. 187-190) and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Symmetrical Key Cryptography -- How Symmetrical Key Cryptography Is Used in the Real World -- How to Attack a Contemporary Cryptographic Algorithm -- An ATM Transaction: An Example of How Symmetrical Key Cryptography Is Used in the "Real" World -- Integrity Protection -- Cryptographic Checksums -- Strong One-Way Functions -- A Description of Currently Used Strong One-Way Functions -- The Key Management Problem -- The Manual Key Transportation Protocol -- Creating Key Parts -- Kerberos, a Symmetrical Key Solution of the n[superscript 2] Problem -- System Initialization -- Alice Starts the Kerberos Protocol -- The KDC Processes Alice's Request -- Alice Processes Her Ticket and Sends a Message to Bob -- Bob Receives and Processes Alice's Message -- Bob Composes a Reply to Alice -- Alice Receives and Decrypts Bob's Reply -- Alice and Bob Can Communicate in a Secure Session -- Kerberos at One Glance -- Public Key Cryptography -- A Physical Analogy: A Protocol for Exchanging a Secret in Public Using Secret Keys -- A Second Physical Analogy: A Protocol for Exchanging a Secret in Public Using a Lock that Has Two Keys -- How Bob Knows Who Sent Him a Message--the Bank Way--with Passwords -- Digital Signatures -- Digital Certificates -- A Summary of What the Public Key Protocol Permits -- How a Digital Certificate Is Really Made -- A Public Key Protocol without Confidentiality -- How to Determine If Alice's Certificate Is Currently Valid -- A Current Example of the Use of Digital Certificates -- Certificate Hierarchies -- Certificate Extension and Attribute Certificates -- The Future of Cryptography and the United States Governmental Politics of Cryptography -- A Tutorial on the Mathematics of Public Key Cryptography -- Underlying Mathematics for Cryptography -- The Caesar Cipher and the Magic Decoding Ring -- A Review of Exponents -- The Diffie-Hellman (-Merkle) Algorithm -- Security Difficulties with the "Plain" DHM Algorithm -- The RSA Algorithm -- How to Use the RSA Algorithm to Encrypt a Message -- How to Use the RSA Algorithm to Create a Digital Signature -- The ElGamal Algorithm -- How to Use the ElGamal Algorithm to Encrypt Messages -- How to Use the ElGamal Algorithm to Create a Digital Signature -- Case Studies of Modern Cryptographic Architectures -- Case Study: Protecting an Intranet with a Kerberos and PKC Hybrid -- Possible Solutions -- The Scoping Document -- The Selection of Kerberos as the Solution -- The Realization That Machines Aren't Human -- The Decision to Use Hardware to Solve Part of The Problem -- How to Transport the Automatically Generated Principal Keys to the KDC -- How to Install the PC Card into Its Server -- The Contents of the CA PC Card -- The Contents of the KDC PC Card -- The Contents of the Principal PC Cards -- The PC Card Installation Protocol -- Case Study: Protecting the California ISO Internet Communications Using PKC -- The Scoping Document -- The Cryptographic Architectural Framework Document -- The Four-Level Certificate Structure -- The Migration Plan -- The Public Key Infrastructure Document -- An Overview of the Proposed Cal ISO PKI -- The Overview of the Cal ISO Cryptographic Keys -- The Certificate and Key Life Cycles -- A Description of Attribute Certificates -- Associated PKI Requirements. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
9 (RLIN) | 73633 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
9 (RLIN) | 73634 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic commerce. |
9 (RLIN) | 73635 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Wiley tech brief series. |
9 (RLIN) | 73632 |
852 ## - LOCATION/CALL NUMBER | |
-- | p29.99 |
-- | 04-03-2002 |
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) | |
a | |
b | 08-12-10 |
c | 08-06-10 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) | |
-- | audmc |
Operator's initials, OID (RLIN) | 04-03-02 |
Cataloger's initials, CIN (RLIN) | m |
First Date, FD (RLIN) | a |
-- | - |
-- | eng |
-- | nyu |
-- | 0 |
935 ## - | |
-- | 122001%5FGEN |
945 ## - LOCAL PROCESSING INFORMATION (OCLC) | |
g | 0 |
i | 625954 |
j | 0 |
l | audmc |
n | Copy Type:01 - Books |
o | - |
p | 110.21 |
q | - |
r | - |
s | - |
t | 1 |
u | 0 |
v | 0 |
w | 0 |
x | 0 |
y | i10188319 |
z | 08-06-10 |
Lost status | Source of classification or shelving scheme | Materials specified (bound volume or other part) | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Copy Type:01 - Books | American University in Dubai | American University in Dubai | Main Collection | 2010-08-06 | 110.21 | QA 76.9 .A25 G68 2001 | 625954 | 2023-12-01 | 110.21 | 2015-07-25 | Books |