| 000 | 01407 a2200373 4500 | ||
|---|---|---|---|
| 001 | 57130 | ||
| 999 |
_c57130 _d14437 |
||
| 003 | TR-AnTOB | ||
| 005 | 20210104164034.0 | ||
| 008 | 061204s2006 njua b 001 0 eng | ||
| 010 | _a2005018455 | ||
| 020 | _a0321320735 | ||
| 040 |
_aDLC _cDLC _dDLC |
||
| 041 | _aeng | ||
| 042 | _apcc | ||
| 050 |
_aQA76.9.D314 _bK45 2006 |
||
| 090 | _aQA76.9.D314 K45 2006 | ||
| 100 |
_aKenan, Kevin _929628 |
||
| 245 | 0 |
_aCryptography in the database : _bthe last line of defense / _cKevin Kenan. |
|
| 264 | 1 |
_aUpper Saddle River, NJ : _bAddison Wesley, _cc2006. |
|
| 300 |
_axxii, 277 p. : _bill. ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references (p. 255-256) and index. | ||
| 650 | 0 |
_aDatabase security _929629 |
|
| 650 | 7 |
_aVeritabanı güvenliği _2etuturkob _929630 |
|
| 650 |
_aKriptografi _929631 |
||
| 650 |
_aCryptography _9428 |
||
| 856 | 4 |
_uhttp://www.loc.gov/catdir/toc/ecip0515/2005018455.html _3Table of contents |
|
| 901 | _a0017628 | ||
| 902 | _aGT | ||
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 925 | 0 |
_aacquire _b2 shelf copies _xpolicy default |
|
| 955 |
_djf09 2005-06-29 to sl _ejf09 2005-06-29 to Dewey _fjf17 2005-12-19; _gjf17 2005-12-19 to BCCD |
||
| 942 | _cBK | ||