skip to content
Cryptography in C and C++ Preview this item
ClosePreview this item
Checking...

Cryptography in C and C++

Author: Michael Welschenbach
Publisher: Berkeley, CA : Apress ; New York : Distributed to the Book trade in the U.S. by Springer-Verlag, ©2005.
Edition/Format:   eBook : Document : English : 2nd American ed., rev. and enlView all editions and formats
Summary:
This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of new material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Welschenbach, Michael.
Cryptography in C and C.
Berkeley, CA : Apress ; New York : Distributed to the Book trade in the U.S. by Springer-Verlag, ©2005
(DLC) 2005002553
(OCoLC)57531603
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Michael Welschenbach
ISBN: 1590595025 9781590595022 9781430200260 143020026X 1430250992 9781430250999 9786610700479 6610700478 9781280700477 1280700475
OCLC Number: 64591511
Reproduction Notes: Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL
Description: 1 online resource (xxv, 478 pages)
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: I. Arithmetic and number theory in C --
1. Introduction --
2. Number formats : the representation of large numbers in C --
3. Interface semantics --
4. The fundamental operations --
5. Modular arithmetic : calculating with residue classes --
6. Where all roads meet : modular exponentiation --
7. Bitwise and logical functions --
8. Input, output, assignment, conversion --
9. Dynamic registers --
10. Basic number-theoretic functions --
11. Rijndael : a successor to the data encryption standard --
12. Large random numbers --
13. Strategies for testing LINT --
II. Arithmetic in C++ with the class LINT --
14. Let C++ simplify your life --
15. The LINTPublic interface : members and friends --
16. Error handling --
17. An application example : the RSA cryptosystem --
18. Do it yourself : test LINT --
19. Approaches for further extensions --
III. Appendices.
Other Titles: Kryptographie in C und C++.
Cryptography in C and C plus plus
Responsibility: Michael Welschenbach ; translated by David Kramer.
More information:

Abstract:

* The chapter on primality tests is thoroughly revised. This is the first book to include practical implementations of the recent major improvements in primality testing * The chapter about random  Read more...

Reviews

Editorial reviews

Publisher Synopsis

From the reviews of the second edition:"Addressing mathematical concepts, algorithms and C/C++ code is not a simple task; the author handles them well throughout the book. This book is translated Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/64591511<\/a>> # Cryptography in C and C++<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nbgn:translationOfWork<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/64591511#CreativeWork\/unidentifiedOriginalWork<\/a>> ; # Kryptographie in C und C++.<\/span>\n\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"64591511<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Place\/berkeley_ca<\/a>> ; # Berkeley, CA<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Warning: This malformed URI has been treated as a string - \'https:\/\/www.safaribooksonline.com\/library\/view\/title\/9781590595022\/?ar?orpq&email=^u\'<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872484<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/computers_networking_security<\/a>> ; # COMPUTERS--Networking--Security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/843279<\/a>> ; # C (Computer program language)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/computers_security_general<\/a>> ; # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/843286<\/a>> ; # C++ (Computer program language)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/computers_internet_security<\/a>> ; # COMPUTERS--Internet--Security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/informatique<\/a>> ; # Informatique<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/884552<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/c_+_+_computer_program_language<\/a>> ; # C + + (Computer program language)<\/span>\n\u00A0\u00A0\u00A0\nschema:alternateName<\/a> \"Cryptography in C and C plus plus<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"2nd American ed., rev. and enl.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2005<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/20507644<\/a>> ; # Michael Welschenbach<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2005<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"I. Arithmetic and number theory in C -- 1. Introduction -- 2. Number formats : the representation of large numbers in C -- 3. Interface semantics -- 4. The fundamental operations -- 5. Modular arithmetic : calculating with residue classes -- 6. Where all roads meet : modular exponentiation -- 7. Bitwise and logical functions -- 8. Input, output, assignment, conversion -- 9. Dynamic registers -- 10. Basic number-theoretic functions -- 11. Rijndael : a successor to the data encryption standard -- 12. Large random numbers -- 13. Strategies for testing LINT -- II. Arithmetic in C++ with the class LINT -- 14. Let C++ simplify your life -- 15. The LINTPublic interface : members and friends -- 16. Error handling -- 17. An application example : the RSA cryptosystem -- 18. Do it yourself : test LINT -- 19. Approaches for further extensions -- III. Appendices.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of new material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primality testing.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/133360<\/a>> ; # Kryptographie in C und C++.<\/span>\n\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/57531603<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography in C and C++<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"64591511<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/64591511#PublicationEvent\/berkeley_ca_apress_new_york_distributed_to_the_book_trade_in_the_u_s_by_springer_verlag_2005<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Agent\/apress<\/a>> ; # Apress<\/span>\n\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Agent\/distributed_to_the_book_trade_in_the_u_s_by_springer_verlag<\/a>> ; # Distributed to the Book trade in the U.S. by Springer-Verlag<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.safaribooksonline.com\/library\/view\/\/9781590595022\/?ar<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.myilibrary.com?id=988132<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proquest.tech.safaribooksonline.de\/9781590595022<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/ebookcentral.proquest.com\/lib\/sfu-ebooks\/detail.action?docID=323330<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/proquest.safaribooksonline.com\/9781590595022<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/VH7QX3XE2P.search.serialssolutions.com\/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000074342&T=marc&tab=BOOKS<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/books.scholarsportal.info\/viewdoc.html?id=\/ebooks\/ebooks2\/springer\/2011-04-28\/1\/9781430200260<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/site.ebrary.com\/id\/10151891<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catdir.loc.gov\/catdir\/toc\/ecip057\/2005002553.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=323330<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.vlebooks.com\/vleweb\/product\/openreader?id=none&isbn=9781430200260<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-1-4302-0026-0<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.myilibrary.com?id=70047&ref=toc<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.library.yorku.ca\/eresolver\/?id=1254092<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.library.yorku.ca\/eresolver\/?id=1254093<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/books.scholarsportal.info\/viewdoc.html?id=\/ebooks\/ebooks2\/springer\/2011-04-28\/7\/9781430200260<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/books.google.com\/books?id=f6xQAAAAMAAJ<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.myilibrary.com?id=70047<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/rave.ohiolink.edu\/ebooks\/ebc\/9781430200260<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> \"https:\/\/www.safaribooksonline.com\/library\/view\/title\/9781590595022\/?ar?orpq&email=^u<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/search.ebscohost.com\/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=182884<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catalog.hathitrust.org\/api\/volumes\/oclc\/57531603.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/link.springer.com\/book\/10.1007\/978-1-4302-0026-0<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/lib.myilibrary.com?id=70047&entityid=https:\/\/idp.brunel.ac.uk\/entity<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/link.springer.com\/book\/10.1007\/978-1-59059-502-2<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.books24x7.com\/marc.asp?bookid=12329<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.springerlink.com\/openurl.asp?genre=book&isbn=978-1-59059-502-2<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781430250999<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781280700477<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781430200260<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9786610700479<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781590595022<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/64591511<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> # New York<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"New York<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Agent\/apress<\/a>> # Apress<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Apress<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Agent\/distributed_to_the_book_trade_in_the_u_s_by_springer_verlag<\/a>> # Distributed to the Book trade in the U.S. by Springer-Verlag<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Distributed to the Book trade in the U.S. by Springer-Verlag<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Place\/berkeley_ca<\/a>> # Berkeley, CA<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Berkeley, CA<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/c_+_+_computer_program_language<\/a>> # C + + (Computer program language)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"C + + (Computer program language)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/computers_internet_security<\/a>> # COMPUTERS--Internet--Security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Internet--Security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/computers_networking_security<\/a>> # COMPUTERS--Networking--Security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Networking--Security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/computers_security_general<\/a>> # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Topic\/informatique<\/a>> # Informatique<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Informatique<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/843279<\/a>> # C (Computer program language)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"C (Computer program language)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/843286<\/a>> # C++ (Computer program language)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"C++ (Computer program language)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872484<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/884552<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/lib.myilibrary.com?id=70047&entityid=https:\/\/idp.brunel.ac.uk\/entity<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Connect to MyiLibrary resource.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/20507644<\/a>> # Michael Welschenbach<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Welschenbach<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Michael<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Michael Welschenbach<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/id\/133360<\/a>> # Kryptographie in C und C++.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Kryptographie in C und C++.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781280700477<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1280700475<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781280700477<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781430200260<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"143020026X<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781430200260<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781430250999<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1430250992<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781430250999<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781590595022<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1590595025<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781590595022<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9786610700479<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"6610700478<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9786610700479<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.library.yorku.ca\/eresolver\/?id=1254092<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"An electronic book accessible through the World Wide Web; click for information<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/57531603<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Cryptography in C and C.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/64591511<\/a>> ; # Cryptography in C and C++<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/64591511<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/64591511<\/a>> ; # Cryptography in C and C++<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-06-18<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/64591511#CreativeWork\/unidentifiedOriginalWork<\/a>> # Kryptographie in C und C++.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"de<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Kryptographie in C und C++.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/64591511#PublicationEvent\/berkeley_ca_apress_new_york_distributed_to_the_book_trade_in_the_u_s_by_springer_verlag_2005<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Place\/berkeley_ca<\/a>> ; # Berkeley, CA<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Agent\/distributed_to_the_book_trade_in_the_u_s_by_springer_verlag<\/a>> ; # Distributed to the Book trade in the U.S. by Springer-Verlag<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/133360#Agent\/apress<\/a>> ; # Apress<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n