000 | 02126cam a2200325 a 4500 | ||
---|---|---|---|
001 | 00004954 | ||
003 | AR-BaUFI | ||
005 | 20240214224847.0 | ||
008 | 050331t1994 xxu||||| |||||||||||eng|c | ||
020 | _a0471597562 | ||
040 | _aAR-BaUFI | ||
044 |
_axxu _cus |
||
080 | 0 | _a004.056 | |
084 | _aS3598 | ||
100 | 1 |
_aSchneier, Bruce _912792 |
|
245 | 0 | 0 |
_aApplied cryptography : _bprotocols, algorithms, and source code in C |
260 |
_aNew York : _bJohn Wiley, _cc1994 |
||
300 |
_axviii, 618 p. : _bgráfs. ; _c23 cm |
||
504 | _aIncluye referencias bibliográficas e índice analítico | ||
650 | 7 |
_aALGORITMOS _2EIT _915470 |
|
650 | 7 |
_aCRIPTOGRAFIA _2EIT _916993 |
|
650 | 7 |
_aSEGURIDAD INFORMATICA _2EIT _921592 |
|
650 | 7 |
_916463 _aC[LENGUAJE DE PROGRAMACION] _2EIT |
|
786 | 1 | _oAIG | |
942 |
_fBKS _n0 |
||
985 |
_aEE _c1 |
||
997 | _aMONOGRAFIA | ||
964 | _aH4sIAHfJJ1MAA7VX25LiNhB9n6/o0uPWjm0Zm8ET8JYXDOUNxlsGcqlUHjSyBpQYi5LMMPO5+YD9 h5WZnc2mshXoVA1Pwm6d03261WoP3z3uangQ2kjVjAh1PAKi4aqSzWZE1qvp9YC8i6+GXNW14K01 ugKwWxpz+2jkiGzbdn/rusfj0Tn2HKU3ru951P0lny/5VuzYtWxMyxouSLfPyFtzejxXnLUnxm8A asWdjXpw86Qc+9Q1tdzBd153eBXTlXF3THPri/uM+WVft815NBV5cfQcB4mvroZacKWr2O4Z1oJV Qsce9ULasB0w34YU+PTAIAg9b+h+MehsK9ayeynqClpm9YooJSCbio4InBZ+t+gsra053D2bWnXF iDASe/YXRGEwdF/enUDdr6jf5wgxHDsk+A0GPC8WxaxMplmCYvFuLg+BdzIFjhf2/0nxb8uaxMte GA1wroQeJmDR4OSMBhj0j+APgmjwBikmikP84VAcPi6GJJv9z7LuYWjskQzB60GPniuLXWdMe+Df gOfjIh8EGJeolRYZMgp/jHPeR6XNdutGSKHPqXlH4vf6wMU5O3tsadTvXSN9vlyQ1pbafl9LYR/o p32rNprtt0/n/DIk3mvVKnufmbfA6o3Sst3uunVTgVEHzcXJ1NIDUvEApfh6iURHtX1Oowh3AL3g 8tYvSPxBbRv4WdbirOS2Ly/EEX5V+k9ka/YxDj0+SCnfQp8OYO+c80mSeKP/ujcO/AB+DzjulvTC CJOLrOH14UmAFvdC2+FKMgN38q6WqvNBcvtXwKemkrb0WMPqT63kCucQRd1iNtU0jG7CPrIf9i9P SHeblcWqGBfzYgnjMvu4ep4UxgWy7nGk43nyU7qESQrLdLYus0kyeU26Sfqq0fyYlu/T8pUVKybZ zOZouk4XqxTJhOpJXzMC2WJalHmyysbIwRFH+E3ZvSpPMp8VZbbK0YnCRfPbPF3M1smHtCtve7ps YHkyzorF78ixBjXjpxJWwrCDPhgkzeVNsrKfEtP8gpkiyXPkAI7q1Ms58sofoDKYppeMTcjpv4+c zv8Dfui+fAbb5d9f/PFnV4V1zyUQAAA= |