| 000 | 01118nam a2200361Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20220912144010.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9780815361459 (hbk) | ||
| 024 | _a201307 | ||
| 037 | _b5990, 18/12/2019, Ashutosh Technical Books | ||
| 037 | _cTextual | ||
| 040 | _beng | ||
| 041 | _aeng | ||
| 082 | _aD65,8(B):(B288), Q9 | ||
| 100 | _aAhmad Khaleel Ed. | ||
| 245 | 0 | _aEmerging security algorithms and techniques | |
| 260 |
_aBoca Raton _bCRC Press _c2019 |
||
| 300 |
_axii, 317p. ill. _ccm |
||
| 500 | _aIndex 309-317p. | ||
| 650 | _a Computer security | ||
| 650 | _a Data encryption | ||
| 650 | _a Key management | ||
| 650 | _a Symmetric algorithms | ||
| 650 | _aComputer Science | ||
| 700 | _a Doja M N Ed. | ||
| 700 | _a Singh Manu Pratap Ed. | ||
| 700 | _a Udzir Nur Izura Ed. | ||
| 942 |
_hD65,8(B):(B288), Q9 _cTEXL _2CC |
||
| 999 |
_c508 _d508 |
||