It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 09632cam 2201057 a 4500
001 ocm57135909
003 OCoLC
005 20200720045415.0
008 041202s1996 dcu ob 001 0 eng c
006 m o d
007 cr cn|||||||||
010 $a 96068943
040 $aBUF$beng$epn$cBUF$dOCLCQ$dN$T$dYDXCP$dTUU$dTNF$dOCLCE$dE7B$dMERUC$dCCO$dCUS$dFVL$dOCLCQ$dORU$dOCLCQ$dZCU$dP4I$dOCLCQ$dDKDLA$dOCLCQ$dUV0$dOCLCQ$dLOA$dAZK$dOCLCQ$dMWM$dINTCL$dCOCUF$dAGLDB$dSUR$dMOR$dPIFBR$dOCLCA$dOCLCQ$dU3W$dLUE$dOCLCF$dSTF$dWRM$dOCLCQ$dVTS$dNRAMU$dEZ9$dVT2$dOCLCQ$dCGU$dWYU$dGDC$dJZ6$dU3G$dM8D$dUKAHL$dUKCRE
019 $a42329133$a70731958$a559169226$a605360316$a609921600$a722182832$a728007004$a960204598$a961627880$a961690383$a962680477$a962713828$a970764976$a975242829$a975300529$a984856734$a988498271$a991917235$a1017612828$a1018005929$a1037929114$a1038632966$a1044642364$a1045382579$a1045386768$a1047527262$a1048244205$a1048751309$a1055338167$a1064119694$a1065752406$a1081056751$a1081271208$a1086971066$a1153542731$a1156337747$a1162448084
020 $a0309054753$q(Online version)
020 $a9780309054751$q(Online version)
020 $a0585025258$q(electronic bk.)
020 $a9780585025254$q(electronic bk.)
020 $a9780309522540$q(pdf)
020 $a0309522544$q(pdf)
020 $z0305054753
035 $a(OCoLC)57135909$z(OCoLC)42329133$z(OCoLC)70731958$z(OCoLC)559169226$z(OCoLC)605360316$z(OCoLC)609921600$z(OCoLC)722182832$z(OCoLC)728007004$z(OCoLC)960204598$z(OCoLC)961627880$z(OCoLC)961690383$z(OCoLC)962680477$z(OCoLC)962713828$z(OCoLC)970764976$z(OCoLC)975242829$z(OCoLC)975300529$z(OCoLC)984856734$z(OCoLC)988498271$z(OCoLC)991917235$z(OCoLC)1017612828$z(OCoLC)1018005929$z(OCoLC)1037929114$z(OCoLC)1038632966$z(OCoLC)1044642364$z(OCoLC)1045382579$z(OCoLC)1045386768$z(OCoLC)1047527262$z(OCoLC)1048244205$z(OCoLC)1048751309$z(OCoLC)1055338167$z(OCoLC)1064119694$z(OCoLC)1065752406$z(OCoLC)1081056751$z(OCoLC)1081271208$z(OCoLC)1086971066$z(OCoLC)1153542731$z(OCoLC)1156337747$z(OCoLC)1162448084
042 $apcc$adlr
043 $an-us---
050 4 $aTK5102.94$b.C78 1996b
072 7 $aTEC$x041000$2bisacsh
082 04 $a005.82$bCry
084 $a54.62$2bcl
245 00 $aCryptography's role in securing the information society /$cKenneth W. Dam and Herbert S. Lin, editors.
260 $aWashington, DC :$bNational Academy Press,$c1996.
300 $a1 online resource (xxx, 688 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $adata file$2rda
500 $a"Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council."
504 $aIncludes bibliographical references and index.
506 $3Use copy$fRestrictions unspecified$2star$5MiAaHDL
533 $aElectronic reproduction.$b[S.l.] :$cHathiTrust Digital Library,$d2010.$5MiAaHDL
538 $aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.$uhttp://purl.oclc.org/DLF/benchrepro0212$5MiAaHDL
583 1 $adigitized$c2010$hHathiTrust Digital Library$lcommitted to preserve$2pda$5MiAaHDL
588 0 $aPrint version record.
505 00 $gMachine generated contents note:$g1.$tGrowing Vulnerability in the Information Age --$g2.$tCryptography: Roles, Market, and Infrastructure --$g3.$tNeeds for Access to Encrypted Information --$g4.$tExport Controls --$g5.$tEscrowed Encryption and Related Issues --$g6.$tOther Dimensions of National Cryptography Policy --$g7.$tPolicy Options for the Future --$g8.$tSynthesis, Findings, and Recommendations --$gApp.$tA Contributors to the NRC Project on National Cryptography Policy --$gApp. C$tBrief Primer on Cryptography --$gApp. D$tOverview of Electronic Surveillance: History and Current Status --$gApp. E$tBrief History of Cryptography Policy --$gApp. F$tBrief Primer on Intelligence --$gApp. G$tInternational Scope of Cryptography Policy --$gApp. H$tSummary of Important Requirements for a Public-Key Infrastructure --$gApp. I$tIndustry-Specific Dimensions of Security --$gApp. J$tExamples of Risks Posed by Unprotected Information --$gApp. K$tCryptographic Applications Programming Interfaces --$gApp. L$tOther Looming Issues Related to Cryptography Policy --$gApp. M$tFederal Information Processing Standards --$gApp. N$tLaws, Regulations, and Documents Relevant to Cryptography.
520 $a"For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions." "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket.
650 0 $aTelecommunication systems$xSecurity measures$xGovernment policy$zUnited States.
650 0 $aCryptography.
650 6 $aTélécommunications, Systèmes de$xSécurité$xMesures$xPolitique gouvernementale$zÉtats-Unis.
650 6 $aCryptographie.
650 7 $aTECHNOLOGY & ENGINEERING$xTelecommunications.$2bisacsh
650 7 $aCryptography.$2fast$0(OCoLC)fst00884552
651 7 $aUnited States.$2fast$0(OCoLC)fst01204155
650 17 $aGeheimschrift.$2gtt
650 17 $aInformatiemaatschappij.$2gtt
650 17 $aBeveiliging.$2gtt
650 7 $aCryptographie.$2ram
650 7 $aSystèmes de télécommunications.$2ram
655 0 $aElectronic book.
655 4 $aElectronic books.
700 1 $aDam, Kenneth W.$1http://isni.org/isni/0000000383011452
700 1 $aLin, Herbert.
710 2 $aNational Research Council (U.S.).$bCommittee to Study National Cryptography Policy.
776 08 $iPrint version:$tCryptography's role in securing the information society.$dWashington, DC : National Academy Press, 1996$w(DLC) 96068943$w(OCoLC)34932315
856 40 $3ebrary$uhttp://site.ebrary.com/id/10041132
856 40 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=899
856 40 $3Google$uhttp://books.google.com/books?id=p-FQAAAAMAAJ
856 40 $3HathiTrust Digital Library, Limited view (search only)$uhttp://catalog.hathitrust.org/api/volumes/oclc/34932315.html
856 40 $3National Academies Press$uhttp://www.nap.edu/catalog.php?record_id=5131
856 40 $3National Academies Press$uhttp://www.nap.edu/openbook.php?record_id=5131
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=3375712
856 4 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=899
856 40 $zVIEW FULL TEXT$uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000133151&T=marc&tab=BOOKS
856 40 $uhttp://libproxy.uwyo.edu/login/?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=899$zView full text
856 40 $uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=899$zAll EBSCO eBooks
856 40 $aEBSCOhost$uhttp://ezpro.cc.gettysburg.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=899$zThis ebook
856 40 $uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780309522540
856 40 $uhttp://ebookcentral.proquest.com/lib/ucreative-ebooks/detail.action?docID=3375712$zConnect to Ebook.
856 40 $uhttps://www.nap.edu/openbook.php?record_id=5131
856 40 $3Alberta Government Library Access$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=899$z(Unlimited Concurrent Users)$zfrom EBSCO Academic Collection
938 $aebrary$bEBRY$nebr10041132
938 $aEBSCOhost$bEBSC$n899
938 $aYBP Library Services$bYANK$n2302933
938 $aYBP Library Services$bYANK$n6011728
938 $aAskews and Holts Library Services$bASKH$nAH36566273
029 1 $aAU@$b000051472548
029 1 $aDEBBG$bBV043140104
029 1 $aDEBSZ$b422620254
029 1 $aGBVCP$b801221390
029 1 $aNZ1$b11921487
029 1 $aNZ1$b16051410
994 $aZ0$bP4A
948 $hHELD BY P4A - 1748 OTHER HOLDINGS