Record ID | harvard_bibliographic_metadata/ab.bib.11.20150123.full.mrc:506826402:1103 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.11.20150123.full.mrc:506826402:1103?format=raw |
LEADER: 01103nam a2200289 a 4500
001 011553567-5
005 20090417051049.0
008 010205s2001 enka b 001 0 eng c
020 $a0201674718
040 $aGUL$cGUL$dTXA$dIQU$dUKM$dFTU$dSafari Books Online, LLC$dMH
050 14 $aQA76.9.A25$bR93 2001
050 4 $aTK5105.59$b.R93 2001
100 1 $aRyan, Peter,$cPhD.
245 14 $aThe modelling and analysis of security protocols :$bthe CSP approach /$cP.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe.
246 30 $aSecurity protocols
260 $aHarlow, England ;$aNew York :$bAddison-Wesley,$c2001.
300 $axiv, 300 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references (p. 285-291) and index.
650 0 $aComputer network protocols.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security$xMathematical models.
650 0 $aComputer software$xVerification.
650 0 $aComputers$xAccess control.
650 0 $aCryptography.
700 1 $aSchneider, S. A.$q(Steve A.)
988 $a20080903
906 $0OCLC