Técnicas criptográficas de protección de datos / (Registro nro. 32345)
[ vista simple ]
000 -LEADER | |
---|---|
fixed length control field | 01453nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | UNASAM - BIBLIOTECA EPG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230522103050.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230519b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 970-15-0602-2 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | UNASAM - BIBLIOTECA EPG |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | spa |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 21 |
Classification number | 005.82 |
Item number | F98 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
9 (RLIN) | 27798 |
Personal name | Fúster Sabater, Amparo |
245 ## - TITLE STATEMENT | |
Title | Técnicas criptográficas de protección de datos / |
Statement of responsibility, etc. | Amparo Fúster Sabater ;Dolores de la Guía Martínez ; Luis Hernández Encinas;Faysti Nibtita Vitini, Jaime Muños Masqué. dez Encinas /Fausto Montoya Vitini |
250 ## - EDITION STATEMENT | |
Edition statement | 2da. Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | México: |
Name of publisher, distributor, etc. | Alfaomega, |
Date of publication, distribution, etc. | 2002. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XV, 372 P.: |
Other physical details | Figuras; |
Dimensions | 23 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Bibliografía: 353, 366 P. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | CAPITULO 1. <br/>--La criptología <br/> CAPITULO 2.<br/>-- Criptografía de clave secreta: Métodos de cifrado en flujo <br/>CAPITULO 3.<br/>-- Criptografía de clave secreta: Métodos de cifrado en bloque <br/>CAPITULO 4.<br/>-- Gestión de claves simétricas <br/>CAPITULO 5.<br/>-- Aplicaciones y arquitectura con cifrado simétrico <br/>CAPITULO 6. <br/>-- Criptosistemas de clave pública <br/>CAPITULO 7. <br/>-- Protocolos criptográficos y firmas digitales <br/>CAPITULO 8.<br/>-- Aplicaciones de la criptografía <br/>CAPITULO 9<br/>-- Aplicaciones criptográficas en redes de comunicaciones. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 27799 |
Topical term or geographic name entry element | Protección de Datos |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Técnicas Criptográficas |
9 (RLIN) | 27800 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Libros |
Edition | 2da. Ed. |
Classification part | 005.82 |
Item part | F98 |
Suppress in OPAC | No |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Coded location qualifier | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Biblioteca Especializada de la Escuela de Post Grado | Biblioteca Especializada de la Escuela de Post Grado | 19/05/2023 | Ciencias I | EPG0172 | 005.82/F98 - 2002 | EPG0172 | 19/05/2023 | Ej. 1 | 19/05/2023 | Libros |