000734009 000__ 01517cam\a2200421Ii\4500 000734009 001__ 734009 000734009 005__ 20230306141116.0 000734009 006__ m\\\\\o\\d\\\\\\\\ 000734009 007__ cr\cn\nnnunnun 000734009 008__ 150917s2015\\\\sz\\\\\\ob\\\\000\0\eng\d 000734009 020__ $$a9783319182759$$qelectronic book 000734009 020__ $$a3319182757$$qelectronic book 000734009 020__ $$z9783319182742 000734009 035__ $$aSP(OCoLC)ocn921302102 000734009 035__ $$aSP(OCoLC)921302102 000734009 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dYDXCP$$dN$T$$dGW5XE$$dIDEBK$$dCDX 000734009 049__ $$aISEA 000734009 050_4 $$aTA330 000734009 08204 $$a510$$223 000734009 24500 $$aComputation, cryptography, and network security$$h[electronic resource] /$$cNicholas J. Daras, Michael Th. Rassias, editors 000734009 264_1 $$aCham :$$bSpringer,$$c[2015] 000734009 264_4 $$c©2015 000734009 300__ $$a1 online resource 000734009 336__ $$atext$$btxt$$2rdacontent 000734009 337__ $$acomputer$$bc$$2rdamedia 000734009 338__ $$aonline resource$$bcr$$2rdacarrier 000734009 504__ $$aIncludes bibliographical references. 000734009 506__ $$aAccess limited to authorized users. 000734009 588__ $$aOnline resource; title from PDF title page (viewed September 22, 2015). 000734009 650_0 $$aEngineering mathematics. 000734009 650_0 $$aComputer networks$$xSecurity measures$$xMathematical models. 000734009 650_0 $$aMathematics. 000734009 7001_ $$aDaras, Nicholas J.,$$eeditor. 000734009 7001_ $$aRassias, Michael Th.,$$d1987-$$eeditor. 000734009 852__ $$bebk 000734009 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-18275-9$$zOnline Access$$91397441.1 000734009 909CO $$ooai:library.usi.edu:734009$$pGLOBAL_SET 000734009 980__ $$aEBOOK 000734009 980__ $$aBIB 000734009 982__ $$aEbook 000734009 983__ $$aOnline 000734009 994__ $$a92$$bISE