Practical cryptography in Python: learning correct cryptography by example
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[California]
Apress
[2019]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484249000/?ar |
Beschreibung: | Online resource; title from cover (Safari, viewed October 31, 2019) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048590584 | ||
003 | DE-627-1 | ||
005 | 20240228120913.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)048590584 | ||
035 | |a (DE-599)KEP048590584 | ||
035 | |a (ORHE)9781484249000 | ||
035 | |a (DE-627-1)048590584 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.824 | |
100 | 1 | |a Nielson, Seth James |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Practical cryptography in Python |b learning correct cryptography by example |c Seth James Nielson, Christopher K. Monson |
264 | 1 | |a [California] |b Apress |c [2019] | |
264 | 4 | |c ©2019 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from cover (Safari, viewed October 31, 2019) | ||
650 | 0 | |a Python (Computer program language) | |
650 | 0 | |a Cryptography | |
650 | 0 | |a Ciphers | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 4 | |a Python (Langage de programmation) | |
650 | 4 | |a Cryptographie | |
650 | 4 | |a Chiffres (Cryptographie) | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a ciphers (codes) | |
650 | 4 | |a Ciphers | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Python (Computer program language) | |
700 | 1 | |a Monson, Christopher K. |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484249000/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048590584 |
---|---|
_version_ | 1821494848341934080 |
adam_text | |
any_adam_object | |
author | Nielson, Seth James Monson, Christopher K. |
author_facet | Nielson, Seth James Monson, Christopher K. |
author_role | aut aut |
author_sort | Nielson, Seth James |
author_variant | s j n sj sjn c k m ck ckm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048590584 (DE-599)KEP048590584 (ORHE)9781484249000 |
dewey-full | 005.824 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.824 |
dewey-search | 005.824 |
dewey-sort | 15.824 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01691cam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-048590584</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120913.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048590584</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048590584</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484249000</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048590584</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.824</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nielson, Seth James</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical cryptography in Python</subfield><subfield code="b">learning correct cryptography by example</subfield><subfield code="c">Seth James Nielson, Christopher K. Monson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[California]</subfield><subfield code="b">Apress</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed October 31, 2019)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Ciphers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffres (Cryptographie)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">ciphers (codes)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ciphers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Python (Computer program language)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Monson, Christopher K.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484249000/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048590584 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:54Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Apress |
record_format | marc |
spelling | Nielson, Seth James VerfasserIn aut Practical cryptography in Python learning correct cryptography by example Seth James Nielson, Christopher K. Monson [California] Apress [2019] ©2019 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from cover (Safari, viewed October 31, 2019) Python (Computer program language) Cryptography Ciphers Data encryption (Computer science) Python (Langage de programmation) Cryptographie Chiffres (Cryptographie) Chiffrement (Informatique) ciphers (codes) Monson, Christopher K. VerfasserIn aut |
spellingShingle | Nielson, Seth James Monson, Christopher K. Practical cryptography in Python learning correct cryptography by example Python (Computer program language) Cryptography Ciphers Data encryption (Computer science) Python (Langage de programmation) Cryptographie Chiffres (Cryptographie) Chiffrement (Informatique) ciphers (codes) |
title | Practical cryptography in Python learning correct cryptography by example |
title_auth | Practical cryptography in Python learning correct cryptography by example |
title_exact_search | Practical cryptography in Python learning correct cryptography by example |
title_full | Practical cryptography in Python learning correct cryptography by example Seth James Nielson, Christopher K. Monson |
title_fullStr | Practical cryptography in Python learning correct cryptography by example Seth James Nielson, Christopher K. Monson |
title_full_unstemmed | Practical cryptography in Python learning correct cryptography by example Seth James Nielson, Christopher K. Monson |
title_short | Practical cryptography in Python |
title_sort | practical cryptography in python learning correct cryptography by example |
title_sub | learning correct cryptography by example |
topic | Python (Computer program language) Cryptography Ciphers Data encryption (Computer science) Python (Langage de programmation) Cryptographie Chiffres (Cryptographie) Chiffrement (Informatique) ciphers (codes) |
topic_facet | Python (Computer program language) Cryptography Ciphers Data encryption (Computer science) Python (Langage de programmation) Cryptographie Chiffres (Cryptographie) Chiffrement (Informatique) ciphers (codes) |
work_keys_str_mv | AT nielsonsethjames practicalcryptographyinpythonlearningcorrectcryptographybyexample AT monsonchristopherk practicalcryptographyinpythonlearningcorrectcryptographybyexample |