{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB23575024.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB23575024#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB23575024.json"},"dc:title":[{"@value":"Cryptography and network security : principles and practice"}],"dc:creator":"William Stallings","dc:publisher":[{"@value":"Pearson"}],"dcterms:extent":"xviii, 748 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2017","cinii:ncid":"BB23575024","prism:edition":"7th ed","cinii:ownerCount":"3","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA00512603#entity","@type":"foaf:Person","foaf:name":[{"@value":"Stallings, William"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001492","@type":"foaf:Organization","foaf:name":"東北大学 電気通信研究所 図書室","rdfs:seeAlso":{"@id":"http://opac.library.tohoku.ac.jp/opac/opac_openurl/?ncid=BB23575024"}},{"@id":"https://ci.nii.ac.jp/library/FA001914","@type":"foaf:Organization","foaf:name":"東京農工大学 小金井図書館","rdfs:seeAlso":{"@id":"https://libwebservice.biblio.tuat.ac.jp/opac/opac_openurl/?ncid=BB23575024"}},{"@id":"https://ci.nii.ac.jp/library/FA006678","@type":"foaf:Organization","foaf:name":"明治大学 図書館","rdfs:seeAlso":{"@id":"https://opac2018.lib.meiji.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BB23575024"}}],"bibo:lccn":["2015051130"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2015051130"}],"prism:publicationDate":["c2017"],"cinii:note":["Includes bibliographical references (p. 726-734) and index"],"dc:subject":["LCC:TK5105.59","DC23:005.8/2"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+encryption+%28Computer+science%29","dc:title":"Data encryption (Computer science)"},{"@id":"https://ci.nii.ac.jp/books/search?q=Coding+theory","dc:title":"Coding theory"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"}],"dcterms:hasPart":[{"@id":"urn:isbn:9780134444284"}]}]}