Codes and ciphers : julius caesar, the enigma, and the internet (Record no. 8376)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01621nam a2200217 a 4500 |
001 - CONTROL NUMBER | |
control field | ASIN0521008905 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190522132807.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150514s2001 xxu eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0521008905 (paperback) |
Terms of availability | $49.99 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780521008907 (paperback) |
037 ## - SOURCE OF ACQUISITION | |
Terms of availability | 2034.00 PKR |
040 ## - CATALOGING SOURCE | |
Transcribing agency | AUI |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Churchhouse, R. F. |
9 (RLIN) | 12712 |
245 10 - TITLE STATEMENT | |
Title | Codes and ciphers : julius caesar, the enigma, and the internet |
Statement of responsibility, etc. | R. F. Churchhouse. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Cambridge |
Name of publisher, distributor, etc. | Cambridge University Press, |
Date of publication, distribution, etc. | 2002. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 240 p. |
Dimensions | 24 cm. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyzes many cipher systems ranging from the earliest and elementary to the most recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history and right up to the present day. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Amazon.com |
Uniform Resource Identifier | <a href="http://www.amazon.com/exec/obidos/ASIN/0521008905/chopaconline-20">http://www.amazon.com/exec/obidos/ASIN/0521008905/chopaconline-20</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Written off { Not Available } | Dewey Decimal Classification | Air University Central Library Islamabad | Air University Central Library Islamabad | 05/14/2015 | Pak American Commercial | RWP/059/04-05 | 652.8 CHU | P4198 | 01/11/2017 | 01/11/2017 | Book | Write of 2018 (IBD/AU/231/10/1/LIB) |