Normal view MARC view

Cryptography and e-commerce : (Record no. 13322)

MARC details
000 -LEADER
fixed length control field 04810cam a22004454a 4500
001 - CONTROL NUMBER
control field 00049929
003 - CONTROL NUMBER IDENTIFIER
control field AE-DuAU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241127164351.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 050915s2001 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 00049929
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0471405744 :
Terms of availability 29.99
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number G68 2001
069 ## -
-- 09501184
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA 76.9 .A25 G68 2001
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA 76.9 .A25 G68 2001
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Graff, Jon.
9 (RLIN) 20936
245 10 - TITLE STATEMENT
Title Cryptography and e-commerce :
Remainder of title a Wiley tech brief /
Statement of responsibility, etc Jon C. Graff.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc John Wiley,
Date of publication, distribution, etc 2001.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 222 p. :
Other physical details ill. ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content Type Term text
Content Type Code txt
337 ## - MEDIA TYPE
Source rdamedia
Media Type Term unmediated
Media Type Code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier Type Term volume
Carrier Type Code nc
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Wiley tech brief series
9 (RLIN) 73632
500 ## - GENERAL NOTE
General note "Wiley Computer Publishing."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 187-190) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Symmetrical Key Cryptography -- How Symmetrical Key Cryptography Is Used in the Real World -- How to Attack a Contemporary Cryptographic Algorithm -- An ATM Transaction: An Example of How Symmetrical Key Cryptography Is Used in the "Real" World -- Integrity Protection -- Cryptographic Checksums -- Strong One-Way Functions -- A Description of Currently Used Strong One-Way Functions -- The Key Management Problem -- The Manual Key Transportation Protocol -- Creating Key Parts -- Kerberos, a Symmetrical Key Solution of the n[superscript 2] Problem -- System Initialization -- Alice Starts the Kerberos Protocol -- The KDC Processes Alice's Request -- Alice Processes Her Ticket and Sends a Message to Bob -- Bob Receives and Processes Alice's Message -- Bob Composes a Reply to Alice -- Alice Receives and Decrypts Bob's Reply -- Alice and Bob Can Communicate in a Secure Session -- Kerberos at One Glance -- Public Key Cryptography -- A Physical Analogy: A Protocol for Exchanging a Secret in Public Using Secret Keys -- A Second Physical Analogy: A Protocol for Exchanging a Secret in Public Using a Lock that Has Two Keys -- How Bob Knows Who Sent Him a Message--the Bank Way--with Passwords -- Digital Signatures -- Digital Certificates -- A Summary of What the Public Key Protocol Permits -- How a Digital Certificate Is Really Made -- A Public Key Protocol without Confidentiality -- How to Determine If Alice's Certificate Is Currently Valid -- A Current Example of the Use of Digital Certificates -- Certificate Hierarchies -- Certificate Extension and Attribute Certificates -- The Future of Cryptography and the United States Governmental Politics of Cryptography -- A Tutorial on the Mathematics of Public Key Cryptography -- Underlying Mathematics for Cryptography -- The Caesar Cipher and the Magic Decoding Ring -- A Review of Exponents -- The Diffie-Hellman (-Merkle) Algorithm -- Security Difficulties with the "Plain" DHM Algorithm -- The RSA Algorithm -- How to Use the RSA Algorithm to Encrypt a Message -- How to Use the RSA Algorithm to Create a Digital Signature -- The ElGamal Algorithm -- How to Use the ElGamal Algorithm to Encrypt Messages -- How to Use the ElGamal Algorithm to Create a Digital Signature -- Case Studies of Modern Cryptographic Architectures -- Case Study: Protecting an Intranet with a Kerberos and PKC Hybrid -- Possible Solutions -- The Scoping Document -- The Selection of Kerberos as the Solution -- The Realization That Machines Aren't Human -- The Decision to Use Hardware to Solve Part of The Problem -- How to Transport the Automatically Generated Principal Keys to the KDC -- How to Install the PC Card into Its Server -- The Contents of the CA PC Card -- The Contents of the KDC PC Card -- The Contents of the Principal PC Cards -- The PC Card Installation Protocol -- Case Study: Protecting the California ISO Internet Communications Using PKC -- The Scoping Document -- The Cryptographic Architectural Framework Document -- The Four-Level Certificate Structure -- The Migration Plan -- The Public Key Infrastructure Document -- An Overview of the Proposed Cal ISO PKI -- The Overview of the Cal ISO Cryptographic Keys -- The Certificate and Key Life Cycles -- A Description of Attribute Certificates -- Associated PKI Requirements.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 73633
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
9 (RLIN) 73634
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic commerce.
9 (RLIN) 73635
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Wiley tech brief series.
9 (RLIN) 73632
852 ## - LOCATION/CALL NUMBER
-- p29.99
-- 04-03-2002
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a
b 08-12-10
c 08-06-10
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- audmc
Operator's initials, OID (RLIN) 04-03-02
Cataloger's initials, CIN (RLIN) m
First Date, FD (RLIN) a
-- -
-- eng
-- nyu
-- 0
935 ## -
-- 122001%5FGEN
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
g 0
i 625954
j 0
l audmc
n Copy Type:01 - Books
o -
p 110.21
q -
r -
s -
t 1
u 0
v 0
w 0
x 0
y i10188319
z 08-06-10
Holdings
Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
  Library of Congress Classification Copy Type:01 - Books     American University in Dubai American University in Dubai Main Collection 2010-08-06 110.21   QA 76.9 .A25 G68 2001 625954 2023-12-01 110.21 2015-07-25 Books
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions