000149243 000__ 00800cam\a2200253\a\4500 000149243 001__ 149243 000149243 005__ 20210513051624.0 000149243 008__ 930507s1994\\\\nyua\\\\\b\\\\001\0\eng\\ 000149243 010__ $$a 93002139 000149243 020__ $$a0471597562 (pbk. : alk. paper) 000149243 035__ $$a(OCoLC)ocm28182240 000149243 035__ $$a149243 000149243 040__ $$aDLC$$cDLC 000149243 049__ $$aISEA 000149243 05000 $$aQA76.9.A25$$bS35 1994 000149243 08200 $$a005.8/2$$220 000149243 1001_ $$aSchneier, Bruce,$$d1963- 000149243 24510 $$aApplied cryptography :$$bprotocols, algorithms, and source code in C /$$cBruce Schneier. 000149243 260__ $$aNew York :$$bWiley,$$cc1994. 000149243 300__ $$axviii, 618 p. :$$bill. ;$$c24 cm. 000149243 504__ $$aIncludes bibliographical references (p. 571-604) and index. 000149243 650_0 $$aComputer security. 000149243 650_0 $$aTelecommunication$$xSecurity measures. 000149243 650_0 $$aCryptography. 000149243 85200 $$bgen$$hQA76.9.A25$$iS35$$i1994 000149243 909CO $$ooai:library.usi.edu:149243$$pGLOBAL_SET 000149243 980__ $$aBIB 000149243 980__ $$aBOOK