| LDR | 02007nam a22005295i 4500 | 
|---|
| 001 | 8811 | 
|---|
| 003 | CONS | 
|---|
| 005 | 20131217200720.0 | 
|---|
| 007 | cr nn 008mamaa | 
|---|
| 008 | 100301s2006    xxu|    s    |||| 0|eng d | 
|---|
| 020 |  | . | ‡a9780387294896 
			‡9978-0-387-29489-6 | 
|---|
| 024 | 7 | . | ‡a10.1007/978-0-387-29489-6 
			‡2doi | 
|---|
| 035 |  | . | ‡a(DE-He213)978-0-387-29489-6 | 
|---|
| 050 |  | 4. | ‡aQA76.9.D343 | 
|---|
| 072 |  | 7. | ‡aUNF 
			‡2bicssc | 
|---|
| 072 |  | 7. | ‡aUYQE 
			‡2bicssc | 
|---|
| 072 |  | 7. | ‡aCOM021030 
			‡2bisacsh | 
|---|
| 100 | 1 | . | ‡aVaidya, Jaideep. 
			‡eauthor. | 
|---|
| 245 | 1 | 0. | ‡aPrivacy Preserving Data Mining 
			‡h[electronic resource] / 
			‡cby Jaideep Vaidya, Yu Michael Zhu, Christopher W. Clifton. | 
|---|
| 264 |  | 1. | ‡aBoston, MA : 
			‡bSpringer US, 
			‡c2006. | 
|---|
| 300 |  | . | ‡aX, 121 p. 20 illus. 
			‡bonline resource. | 
|---|
| 336 |  | . | ‡atext 
			‡btxt 
			‡2rdacontent | 
|---|
| 337 |  | . | ‡acomputer 
			‡bc 
			‡2rdamedia | 
|---|
| 338 |  | . | ‡aonline resource 
			‡bcr 
			‡2rdacarrier | 
|---|
| 347 |  | . | ‡atext file 
			‡bPDF 
			‡2rda | 
|---|
| 490 | 1 | . | ‡aAdvances in Information Security, 
			‡x1568-2633 ; 
			‡v19 | 
|---|
| 650 |  | 0. | ‡aComputer science. | 
|---|
| 650 |  | 0. | ‡aComputer Communication Networks. | 
|---|
| 650 |  | 0. | ‡aData structures (Computer science). | 
|---|
| 650 |  | 0. | ‡aData encryption (Computer science). | 
|---|
| 650 |  | 0. | ‡aDatabase management. | 
|---|
| 650 |  | 0. | ‡aData mining. | 
|---|
| 650 |  | 0. | ‡aInformation storage and retrieval systems. | 
|---|
| 650 | 1 | 4. | ‡aComputer Science. | 
|---|
| 650 | 2 | 4. | ‡aData Mining and Knowledge Discovery. | 
|---|
| 650 | 2 | 4. | ‡aDatabase Management. | 
|---|
| 650 | 2 | 4. | ‡aData Structures, Cryptology and Information Theory. | 
|---|
| 650 | 2 | 4. | ‡aData Encryption. | 
|---|
| 650 | 2 | 4. | ‡aInformation Storage and Retrieval. | 
|---|
| 650 | 2 | 4. | ‡aComputer Communication Networks. | 
|---|
| 700 | 1 | . | ‡aZhu, Yu Michael. 
			‡eauthor. | 
|---|
| 700 | 1 | . | ‡aClifton, Christopher W. 
			‡eauthor. | 
|---|
| 710 | 2 | . | ‡aSpringerLink (Online service) | 
|---|
| 773 | 0 | . | ‡tSpringer eBooks | 
|---|
| 776 | 0 | 8. | ‡iPrinted edition: 
			‡z9780387258867 | 
|---|
| 830 |  | 0. | ‡aAdvances in Information Security, 
			‡x1568-2633 ; 
			‡v19 | 
|---|
| 856 | 4 | 0. | ‡uhttp://biblioteca.ipicyt.edu.mx:2048/login?url=http://dx.doi.org/10.1007/978-0-387-29489-6 
			‡yTexto completo 
			‡9CONS | 
|---|
| 950 |  | . | ‡aComputer Science (Springer-11645) | 
|---|
| 901 |  | . | ‡a8811 
			‡b 
			‡c8811 
			‡tbiblio 
			‡sSystem Local | 
|---|