000 02289cam a2200373 a 4500
001 00010877
003 AR-BaUFI
005 20160517110043.0
008 090605t2006 xxua|||| |||||||||||eng|c
020 _a0131873164
040 _aAR-BaUFI
044 _axxu
_cus
080 0 _a004.72.056
084 _aS7827
100 1 _913457
_aStallings, William
_cDr.
245 0 0 _aCryptography and network security :
_bprinciples and practices
250 _a4th. ed.
260 _aUpper Saddle River, NJ. :
_bPearson Education,
_cc2006
300 _axvi, 680 p. :
_bil., gráfs. ;
_c24 cm
500 _aProblemas al final de cada capítulo
504 _aIndice alfabético
650 7 _aCONTROLES DE ACCESO
_2RDO
_916875
650 7 _aFIRMAS DE CLAVE PUBLICA
_2CCC
_918322
650 7 _aVALIDACION DE IDENTIFICACION
_2RDO
_922545
650 7 _aCRIPTOGRAFIA
_2EIT
_916993
650 7 _aVIRUS INFORMATICOS
_2EIT
_922657
650 7 _aSEGURIDAD INFORMATICA
_2EIT
_921592
650 7 _aREDES DE COMPUTADORAS
_2EIT
_921266
786 1 _oAIG
942 _fBKS
_n0
985 _aEE
_c1
997 _aMONOGRAFIA
964 _aH4sIAETOJ1MAA7VYUY+bOBB+319h+fG0BUNCSPYSKo6QFW0IESTtvXqxN/GdA8gmm92f28d7uP9w JuleW7VqMpXygiwYf9/MeGY8w/jt806iJ660qKsJdiyCEa/KmolqM8Hr1ezNEL8NbsZlLSUvWyN0 g5DZUum7Zy0meNu2zZ1tHw4H69CzarWxXUIc+890XpRbvqNvRKVbWpUcd/u0uNPH1/O6pO2R8SsA WZfWpn6y0zCPXMfWUuzQDz53eIwqpu0dVaXRxT5hft7XbbOeNcOvip7jwMHNzVjxslYsMHvGklPG VUAcx/MrukPUNSb1PX9PUd8jZGx/FuhkGW3po+CSoZYaf40cByNRMWeC0XHhdotO0sjq/cNJ1HiX TzDFATGuIkPfH9uv346g9v+oP+bwIBw7ILgPAU+zRXafh7MkBLEQ/3ITys5Nfct3LeINvmX5Xlji oPCHLsyhxCMQm3kF8+hoCEHv9d0B+Q3oTRAD/8tyYPgwC8Lk/hfjugehMTk5QmSAiHcuKHZfhN0+ zPJhH6KSg4xvgTaDCCKY9i7o3IqWSmmqvj7nzwccfBRGlMJKC3Evt7U1tqqXpq03ijbbF2QKPqp4 e6jV30jzcq9E+3JOTY2DRomqFI3k+ojQKGpusJJrmN59kBvXBRAdFAH9dmshzoAUoAujNMkyABJc fmlwHCw5VbquUMz2pybggqq+bhquUEEZkxzlwvQrt2jxDpZsxHMhaj4/iVs0GBLUWOcUFDgQ0rpF G/XpUVvod1NnUAnMDm8EOaSkYiaQEZWP9OEfE9P1NcmWqn6QpsEyWSTRo6jMk3FUUkbNo/m33Usg /eDygzD0sySPP4bzOTCxYCTL9wkUH5RVeTyNCzSNUZSly/UqnGZ5eFXCIr5f58k0nKJkMcvyNFwl EbBLgxF+SPJ18RVZdlXzojxZrn6p9wRaFc6NE6MkW3SHl0zjxSqZGU92b67Ja4I+DU8BMw8/xGi5 /mN+5QOMssUqz+anMA2jKC4yYLcEmh1igVZbrule7YEXMoxndeSou5KVcwa9/IeXV0pm5qFZeu6u MPNMmKawLnEEKtffKXHWRlCYxPEFJgInDH8AnDBg8A5owCNOzxn6PWfws2FhbL/+MTDLLz9Hgv8A EwDutlARAAA=