001 |
|
37554 |
010 |
|
|a98028234
|
020 |
|
|a0471283053|b(pbk.)|cNT1200.00
|
035 |
|
|a1042842
|
035 |
|
|a98028234
|
040 |
|
|aDLC|cDLC|dNOU
|
050 |
00
|
|aHD30.38|b.M47 1998
|
050 |
00
|
|aHD30.38
|
082 |
00
|
|a658/.0558|221
|
809 |
|
|pBOOK|dHD30.38|e.M47|y1998
|
100 |
1
|
|aMerkow, Mark S.
|
245 |
10
|
|aBuilding SET applications for secure transactions|c/ Mark S. Merkow, Jim Breithaup, Ken L. Wheeler.
|
260 |
|
|aNew York|b: Wiley|c, c1998.
|
300 |
|
|axii, 403 p.|b: ill.|c; 24 cm.
|
500 |
|
|a"Wiley computer publishing."
|
500 |
|
|aIncludes index.
|
650 |
0
|
|aBusiness enterprises|x--Computer networks|x--Security measures.
|
650 |
0
|
|aData encryption.
|
650 |
0
|
|aElectronic commerce.
|
653 |
|
|aSecure electronic transactions
|
700 |
1
|
|aBreithaup, Jim|d, 1955-
|
700 |
1
|
|aWheeler, Ken L.|d, 1955-
|
095 |
|
|aLB|bLBA|cE007426|dHD30.38|e.M47|pBOOK|y1998|zB|m0|tLCC
|