|
|
|
|
LEADER |
01783nam a2200481 i 4500 |
001 |
95221 |
003 |
CZ ZlUTB |
005 |
20200414154846.0 |
007 |
ta |
008 |
200313s2020 gw a e 001 0 eng d |
999 |
|
|
|c 95221
|d 95221
|
020 |
|
|
|a 9783662581452
|q (vázáno)
|
040 |
|
|
|a ZLD002
|b cze
|e rda
|
072 |
|
7 |
|a 004
|x Počítačová věda. Výpočetní technika. Informační technologie
|2 Konspekt
|9 23
|
080 |
|
|
|a 51-3
|2 MRF
|
080 |
|
|
|a 004.056.53:005.935.31
|2 MRF
|
080 |
|
|
|a 004.056.55
|2 MRF
|
080 |
|
|
|a (048.8:082)
|2 MRF
|
100 |
1 |
|
|a Boyd, Colin,
|d 1959-
|7 xx0034502
|4 aut
|
245 |
1 |
0 |
|a Protocols for authentication and key establishment /
|c Colin Boyd, Anish Mathuria, Douglas Stebila
|
250 |
|
|
|a Second edition
|
264 |
|
1 |
|a Berlin :
|b Springer,
|c [2020]
|
264 |
|
4 |
|c ©2020
|
300 |
|
|
|a xxviii, 521 stran :
|b ilustrace ;
|c 25 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a bez média
|b n
|2 rdamedia
|
338 |
|
|
|a svazek
|b nc
|2 rdacarrier
|
504 |
|
|
|a Obsahuje bibliografii a rejstříky
|
650 |
0 |
7 |
|a výpočetní metody
|7 ph309624
|2 czenas
|
650 |
0 |
7 |
|a autentizace uživatele
|7 ph761295
|2 czenas
|
650 |
0 |
7 |
|a šifrování dat
|7 ph1066933
|2 czenas
|
650 |
0 |
9 |
|a computational methods
|2 eczenas
|
650 |
0 |
9 |
|a user authentication
|2 eczenas
|
650 |
0 |
9 |
|a data encryption
|2 eczenas
|
653 |
|
|
|a Transport Layer Security
|
655 |
|
7 |
|a kolektivní monografie
|7 fd501537
|2 czenas
|
655 |
|
9 |
|a collective monographs
|2 eczenas
|
700 |
1 |
|
|a Mathuria, Anish,
|d 1967-
|7 xx0034501
|4 aut
|
700 |
1 |
|
|a Stebila, Douglas
|4 aut
|
910 |
|
|
|a ZLD002
|
942 |
|
|
|2 udc
|
992 |
|
|
|a BK
|b SK
|
952 |
|
|
|0 0
|1 0
|4 0
|6 004BOYDC
|7 0
|8 BOOK
|9 154761
|a UTBZL
|b UTBZL
|c 007
|d 2020-03-13
|l 1
|m 1
|o 004/BOYD,C.
|p 420010182993
|q 2025-04-06
|r 2020-04-06
|s 2020-04-06
|v 1670.00
|w 2020-03-13
|x N: nákup;
|y 08
|