000 02126cam a2200325 a 4500
001 00004954
003 AR-BaUFI
005 20240214224847.0
008 050331t1994 xxu||||| |||||||||||eng|c
020 _a0471597562
040 _aAR-BaUFI
044 _axxu
_cus
080 0 _a004.056
084 _aS3598
100 1 _aSchneier, Bruce
_912792
245 0 0 _aApplied cryptography :
_bprotocols, algorithms, and source code in C
260 _aNew York :
_bJohn Wiley,
_cc1994
300 _axviii, 618 p. :
_bgráfs. ;
_c23 cm
504 _aIncluye referencias bibliográficas e índice analítico
650 7 _aALGORITMOS
_2EIT
_915470
650 7 _aCRIPTOGRAFIA
_2EIT
_916993
650 7 _aSEGURIDAD INFORMATICA
_2EIT
_921592
650 7 _916463
_aC[LENGUAJE DE PROGRAMACION]
_2EIT
786 1 _oAIG
942 _fBKS
_n0
985 _aEE
_c1
997 _aMONOGRAFIA
964 _aH4sIAHfJJ1MAA7VX25LiNhB9n6/o0uPWjm0Zm8ET8JYXDOUNxlsGcqlUHjSyBpQYi5LMMPO5+YD9 h5WZnc2mshXoVA1Pwm6d03261WoP3z3uangQ2kjVjAh1PAKi4aqSzWZE1qvp9YC8i6+GXNW14K01 ugKwWxpz+2jkiGzbdn/rusfj0Tn2HKU3ru951P0lny/5VuzYtWxMyxouSLfPyFtzejxXnLUnxm8A asWdjXpw86Qc+9Q1tdzBd153eBXTlXF3THPri/uM+WVft815NBV5cfQcB4mvroZacKWr2O4Z1oJV Qsce9ULasB0w34YU+PTAIAg9b+h+MehsK9ayeynqClpm9YooJSCbio4InBZ+t+gsra053D2bWnXF iDASe/YXRGEwdF/enUDdr6jf5wgxHDsk+A0GPC8WxaxMplmCYvFuLg+BdzIFjhf2/0nxb8uaxMte GA1wroQeJmDR4OSMBhj0j+APgmjwBikmikP84VAcPi6GJJv9z7LuYWjskQzB60GPniuLXWdMe+Df gOfjIh8EGJeolRYZMgp/jHPeR6XNdutGSKHPqXlH4vf6wMU5O3tsadTvXSN9vlyQ1pbafl9LYR/o p32rNprtt0/n/DIk3mvVKnufmbfA6o3Sst3uunVTgVEHzcXJ1NIDUvEApfh6iURHtX1Oowh3AL3g 8tYvSPxBbRv4WdbirOS2Ly/EEX5V+k9ka/YxDj0+SCnfQp8OYO+c80mSeKP/ujcO/AB+DzjulvTC CJOLrOH14UmAFvdC2+FKMgN38q6WqvNBcvtXwKemkrb0WMPqT63kCucQRd1iNtU0jG7CPrIf9i9P SHeblcWqGBfzYgnjMvu4ep4UxgWy7nGk43nyU7qESQrLdLYus0kyeU26Sfqq0fyYlu/T8pUVKybZ zOZouk4XqxTJhOpJXzMC2WJalHmyysbIwRFH+E3ZvSpPMp8VZbbK0YnCRfPbPF3M1smHtCtve7ps YHkyzorF78ixBjXjpxJWwrCDPhgkzeVNsrKfEtP8gpkiyXPkAI7q1Ms58sofoDKYppeMTcjpv4+c zv8Dfui+fAbb5d9f/PFnV4V1zyUQAAA=