Detail
Raw data [ X ]
<section name="raw"> <SEQUENTIAL> <record key="001" att1="001" value="LIB905185705" att2="LIB905185705">001 LIB905185705</record> <field key="037" subkey="x">englisch</field> <field key="050" subkey="x">Buch</field> <field key="076" subkey="">EDV</field> <field key="100" subkey="">denning, dorothy elizabeth robling</field> <field key="103" subkey="">purdue university</field> <field key="331" subkey="">cryptography and data security</field> <field key="403" subkey="">1. ed.</field> <field key="410" subkey="">reading, menlo park, london</field> <field key="412" subkey="">addison-wesley publishing company</field> <field key="425" subkey="">1982</field> <field key="433" subkey="">xiii, 400 pp.</field> <field key="517" subkey="c">from the table of contents: preface; introduction; encryption algorithms; cryptographic techniques; access controls; information</field> <field key="flo" subkey="w">controls; inference controls;</field> <field key="540" subkey="">0-201-10150-5</field> <field key="544" subkey="">10126-A</field> <field key="700" subkey="b">001</field> <field key="700" subkey="b">knowledge</field> <field key="710" subkey="">computers -- access control</field> <field key="710" subkey="">cryptography</field> <field key="710" subkey="">data protection</field> </SEQUENTIAL> </section> Servertime: 0.079 sec | Clienttime:
sec
|