An empirical evaluation of the design and function of a small marine reserve (Waikiki Marine Life Conservation District)





Cryptography theory & prac

Document number:
V3418D419
Date of Recordation:
June 29, 1998
Entire Copyright Document:
V3418 D419 P1-9
Registration Number Not Verified:
TX 4-047-694.
Title:
Cryptography theory & prac / By Douglas Stinson. TX 4-047-694.
Number of similar titles:
2
Title appears in Document:
Polymeric mtls ency & 274 other titles.

Cryptography theory & prac

Document number:
V3387P281
Date of Recordation:
June 2, 1997
Entire Copyright Document:
V3387P281-294
Registration Number Not Verified:
TX 4-047-694.
Title:
Cryptography theory & prac / By Douglas Stinson. TX 4-047-694.
Number of similar titles:
2
Title appears in Document:
Polymeric mtls ency & 222 other titles.

Cryptography theory & prac

Document number:
V3362P307
Date of Recordation:
February 7, 1997
Entire Copyright Document:
V3362P307-312
Registration Number Not Verified:
TX 4-047-694.
Title:
Cryptography theory & prac / By Douglas Stinson. TX 4-047-694.
Number of similar titles:
2
Title appears in Document:
Polymeric mtis ency & 199 other titles.

Moving frontiers; readings in the history of the Lutheran Church--Missouri synod. Editor: Carl S. Meyer

Type of Work:
Non-dramatic literary work
Registration Number / Date:
A00000712114 / 1964-08-18
RE0000585273 / 1992-05-04
Title:
Moving frontiers; readings in the history of the Lutheran Church--Missouri synod. Editor: Carl S. Meyer.
Variant title:
Moving frontiers
Copyright Claimant:
Concordia Publishing House (PWH)
Names:
Carl S. Meyer
Concordia Publishing House (4851 documents)
example document: Processional for Trinity on Holy, holy, holy

Copyrights records by Concordia Publishing House



Cryptography

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0000902242 / 1982-04-07
Date of Publication:
April 22, 1981
Date of Creation:
1980
Title:
Cryptography : a primer / Alan G. Konheim.
Basis of Claim:
New Matter: "text has been extensively rewritten & rev."
Previous Registration:
Prev. reg. 1979, TX 20-236.
Description:
1 v.
Number of similar titles:
24
Copyright Claimant:
Alan G. Konheim
Names:
Alan G. Konheim 1934-

Cryptography and data security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001004953 / 1982-10-20
Date of Publication:
May 28, 1982
Date of Creation:
1981
Title:
Cryptography and data security / Dorothy Elizabeth Robling Denning.
Imprint:
Reading, Mass. : Addison-Wesley Pub. Co., c1982.
Description:
400 p.
Copyright Claimant:
Addison-Wesley Publishing Company, Inc.
Authorship on Application:
ill.: Addison-Wesley Publishing Company, Inc., employer for hire.
Names:
Dorothy Elizabeth Robling Denning 1945-
Addison-Wesley Publishing Company, Inc. (3680 documents)
example document: The Metafontbook

Copyrights records by Addison-Wesley Publishing Company, Inc.



Cryptography

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001015082 / 1982-11-02
Date of Publication:
August 12, 1982
Date of Creation:
1981
Title:
Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systems / Carl H. Meyer, Stephen M. Matyas.
Basis of Claim:
New Matter: "most of text & most ill. are new."
Previous Registration:
Some ill. & some text prev. pub. Appl. states U. S. copyright is not claimed in any material taken from U.S. Govt. sources.
Imprint:
New York : J. Wiley, c1982.
Description:
755 p.
Number of similar titles:
24
Variant title:
Cryptography : a new dimension in computer data security
Copyright Claimant:
John Wiley & Sons, Inc.
Names:
Stephen M. Matyas
Carl H. Meyer
John Wiley & Sons, Inc. (9077 documents)
example document: Sales management

Copyrights records by John Wiley & Sons, Inc.



Cryptography

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001203008 / 1983-09-06
Date of Publication:
February 25, 1983
Date of Creation:
1983
Title:
Cryptography : proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29-April 2, 1982 / edited by Thomas Beth.
Series:
Lecture notes in computer science ;
Imprint:
New York : Springer, 1983.
Description:
402 p.
Number of similar titles:
24
Other Title:
Lecture notes in computer science ; v. 149
Copyright Claimant:
Springer-Verlag
Names:
Thomas Beth 1949-
Workshop on Cryptography, Burg Feurerstein, Ger., 1982
Springer-Verlag (2881 documents)
example document: Tracking the automatic ant, and other mathematical explorations

Copyrights records by Springer-Verlag


Cryptography, Workshop on.

Cryptography and logarithms over finite fields

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001542134 / 1985-03-14
Date of Publication:
December 14, 1984
Date of Creation:
1984
Title:
Cryptography and logarithms over finite fields / Taher A. Elgamal.
Imprint:
Ann Arbor : University Microfilms International, 1985 [i.e. 1984]
Description:
Microfiche.
Copyright Claimant:
Taher A. Elgamal
Names:
Taher A. Elgamal 1955-

Cryptography Z

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0001831616 / 1986-06-20
Date of Publication:
June 18, 1986
Date of Creation:
1986
Title:
Cryptography Z.
Copyright Claimant:
John J. Zeleniak
Notes:
Cataloged from appl.
Authorship on Application:
text: John J. Zeleniak.
Names:
John J. Zeleniak 1910-

Linear algebra, markov chains, and queueing models

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0003628963 / 1993-09-17
Date of Publication:
September 10, 1993
Date of Creation:
1993
Title:
Linear algebra, markov chains, and queueing models / Carl D. Meyer, Robert J. Plemmons, editors ; with 55 ill.
Series:
The IMA volumes in mathematics and its applications ;
Imprint:
New York : Springer-Verlag, c1993.
Description:
294 p.
Other Title:
The IMA volumes in mathematics and its applications ; v. 48
Copyright Claimant:
Springer-Verlag New York, Inc. (employer for hire)
Names:
Carl Dean Meyer
Robert J. Plemmons

Copyrights records by Plemmons, Robert J.


Springer-Verlag New York, Inc. (1545 documents)
example document: Diagnostic imaging in ophthalmology

Copyrights records by Springer-Verlag New York, Inc.



Cryptography and secure communications

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0003704831 / 1993-11-23
Date of Publication:
October 1, 1993
Date of Creation:
1993
Title:
Cryptography and secure communications / Man Young Rhee.
Series:
McGraw-Hill series on comptuer communications
Imprint:
New York : McGraw-Hill, c1994.
Description:
504 p.
Copyright Claimant:
McGraw-Hill, Inc.
Names:
Man Young Rhee

Copyrights records by Rhee, Man Young


McGraw-Hill, Inc. (9577 documents)
example document: Handbook for professional managers

Copyrights records by McGraw-Hill, Inc.



Cryptography

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004047694 / 1995-05-12
Date of Publication:
April 11, 1995
Date of Creation:
1995
Title:
Cryptography : theory and practice / Douglas R. Stinson.
Series:
The CRC Press series on discrete mathematics and its applications
Imprint:
Boca Raton, FL : CRC Press, c1995.
Description:
434 p.
Number of similar titles:
24
Variant title:
Cryptography : theory and practice
Other Title:
The CRC Press series on discrete mathematics and its applications
Copyright Claimant:
CRC Press, Inc. (employer for hire)
Names:
Douglas Robert Stinson 1956-
CRC Press, Inc. (1262 documents)
example document: Nuclear medical physics

Copyrights records by CRC Press, Inc.



Cryptography's role in securing the information society

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004417053 / 1996-12-02
Date of Publication:
October 30, 1996
Date of Creation:
1996
Title:
Cryptography's role in securing the information society / Kenneth W. Dam and Herbert S. Lin, editors.
Imprint:
Washington, DC : National Academy Press, 1996.
Description:
688 p.
Copyright Claimant:
National Academy of Sciences (employer for hire)
Names:
Herbert S. Lin

Copyrights records by Lin, Herbert S.


Kenneth W. Dam

Copyrights records by Dam, Kenneth W.


National Academy of Sciences (759 documents)
example document: Eclipse

Copyrights records by National Academy of Sciences



Cryptography and network security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0004806504 / 1998-07-06
Date of Publication:
June 4, 1998
Date of Creation:
1997
Title:
Cryptography and network security : principles and practice / William Stallings.
Edition:
2nd ed.
Basis of Claim:
New Matter: additions & revisions.
Previous Registration:
Prev. reg. 1995.
Imprint:
Upper Saddle River, NJ : Prentice Hall, c1999.
Description:
569 p.
Number of similar titles:
2
Copyright Claimant:
Prentice-Hall, Inc., a Simon & Schuster company
Names:
William Stallings (101 documents)
example document: William's jazz

Copyrights records by Stallings, William


Prentice-Hall, Inc. (10877 documents)
example document: Child psychology

Copyrights records by Prentice-Hall, Inc.



Matrix analysis and applied linear algebra

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005241017 / 2000-06-30
Date of Publication:
June 21, 2000
Date of Creation:
2000
Title:
Matrix analysis and applied linear algebra : solutions manual / Carl D. Meyer.
Description:
171 p.
Variant title:
Matrix analysis and applied linear algebra : solutions manual
Copyright Claimant:
Society for Industrial & Applies Mathematics
Names:
Carl D. Meyer
Society for Industrial & Applies Mathematics

Cryptography decrypted

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005266992 / 2001-02-12
Date of Publication:
December 28, 2000
Date of Creation:
1999
Title:
Cryptography decrypted / H. X. Mel, Doris Baker ; math appendix by Steve Burnett ; foreword by John Kinyon.
Imprint:
Boston : Addison-Wesley, c2001.
Description:
352 p.
Copyright Claimant:
Cary Meltzer & Doris Baker
Names:
pseud. H. X. Mel
Doris Baker (3 documents)
example document: Through the years with the cousins two
Cary Meltzer
John Kinyon (75 documents)
example document: Tara theme. From Gone with the wind. m Max Steiner, arr. for marching band: Remick Music Corporation, employer for hire of John Kinyon

Copyrights records by Kinyon, John


Steve Burnett (19 documents)
example document: Mac OS X bible

Copyrights records by Burnett, Steve



Cryptography theory and practice

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005525602 / 2002-05-08
Date of Publication:
February 27, 2002
Date of Creation:
2002
Title:
Cryptography theory and practice / Douglas R. Stinson.
Edition:
2nd ed.
Basis of Claim:
New Matter: revised and updated.
Imprint:
Boca Raton, FL : Chapman & Hall, c2002.
Description:
339 p.
Number of similar titles:
1
Copyright Claimant:
CRC Press, LLC (employer for hire)
Names:
Douglas R. Stinson
CRC Press, LLC (633 documents)
example document: Trophic organization in coastal systems

Copyrights records by CRC Press, LLC



Cryptography and network security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005618035 / 2002-09-18
Date of Publication:
August 27, 2002
Date of Creation:
2001
Title:
Cryptography and network security : principles and practice / William Stallings.
Edition:
3rd ed.
Basis of Claim:
New Matter: revisions & updates.
Previous Registration:
Prev. reg. 1998, TX 4-806-504.
Imprint:
Upper Saddle River, NJ : Prentice Hall, c2003.
Description:
681 p.
Number of similar titles:
2
Variant title:
Cryptography and network security : principles and practice
Copyright Claimant:
Pearson Education, Inc.
Names:
William Stallings (101 documents)
example document: Dance all night
Pearson Education, Inc. (6056 documents)
example document: Advanced accounting

Copyrights records by Pearson Education, Inc.



Cryptography demystified

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005625825 / 2002-10-18
Date of Publication:
August 13, 2002
Date of Creation:
2002
Title:
Cryptography demystified / John E. Hershey.
Imprint:
New York : McGraw-Hill, c2003.
Description:
356 p.
Copyright Claimant:
McGraw-Hill Companies, Inc.
Names:
John E. Hershey

Copyrights records by Hershey, John E.


McGraw-Hill Companies, Inc. (7851 documents)
example document: The recording angel: exploration in phonography

Copyrights records by McGraw-Hill Companies, Inc.



Cryptography for Internet and database applications

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005629768 / 2002-10-08
Date of Publication:
August 9, 2002
Date of Creation:
2002
Title:
Cryptography for Internet and database applications : developing secret and public key techniques with Java / Nick Galbreath.
Imprint:
[Indianapolis] : Wiley, c2002.
Description:
400 p.
Copyright Claimant:
Wiley Publishing, Inc.
Names:
Nick Galbreath
Wiley Publishing, Inc. (744 documents)
example document: Photoshop for right-brainers

Copyrights records by Wiley Publishing, Inc.



Cryptography

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005684388 / 2003-02-28
Date of Publication:
November 21, 2002
Date of Creation:
2002
Title:
Cryptography : an introduction / V. V. Yaschenko, editor ; translated from the Russian by Sergei Lando.
Basis of Claim:
New Matter: translation.
Series:
Student mathematical library ;
Imprint:
Providence : American Mathematical Society, c2002.
Description:
229 p.
Number of similar titles:
24
Variant title:
Cryptography : an introduction
Other Title:
Student mathematical library ; vol. 18
Copyright Claimant:
American Mathematical Society (employer for hire)
Names:
Sergei Lando
V. V. Yaschenko
American Mathematical Society (918 documents)
example document: Soviet mathematics; journal. Vol. 1, no. 4, July 1960

Copyrights records by American Mathematical Society



Cryptography For Dummies

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0005895740 / 2004-01-23
Date of Publication:
January 8, 2004
Date of Creation:
2003
Title:
Cryptography For Dummies / by Chey Cobb.
Imprint:
Hoboken, NJ : Wiley, c2004.
Description:
304 p.
Copyright Claimant:
Wiley Publishing, Inc.
Names:
Chey Cobb
Wiley Publishing, Inc. (744 documents)
example document: Software testing fundamentals

Cryptography in the database

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0006245280 / 2005-12-06
Date of Publication:
October 26, 2005
Date of Creation:
2004
Title:
Cryptography in the database : the last line of defense.
Copyright Note:
Cataloged from appl. only.
Copyright Claimant:
Symantec Corporation
Authorship on Application:
Kevin Kenan.
Names:
Kevin Kenan
Symantec Corporation (7 documents)
example document: On target

Copyrights records by Symantec Corporation



Cryptography theory and practice

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0006267924 / 2005-11-14
Date of Publication:
October 1, 2005
Date of Creation:
2005
Title:
Cryptography theory and practice.
Basis of Claim:
New Matter: rev. & updated material.
Copyright Note:
Cataloged from appl. only.
Number of similar titles:
1
Copyright Claimant:
Taylor and Francis
Names:
Taylor and Francis (290 documents)
example document: It's my life now

Copyrights records by Taylor and Francis



Cryptography and network security

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0006304469 / 2006-01-17
Date of Publication:
November 16, 2005
Date of Creation:
2004
Title:
Cryptography and network security : principles and practices.
Edition:
4th ed.
Basis of Claim:
New Matter: rev. & updated.
Previous Registration:
Prev. reg. 2002, TX 5-618-035.
Copyright Note:
Cataloged from appl. only.
Number of similar titles:
2
Copyright Claimant:
Pearson Education, Inc.
Authorship on Application:
new & rev. text: William Stallings.
Names:
William Stallings (101 documents)
example document: Ol' favorites
Pearson Education, Inc. (6056 documents)
example document: Treasures

An empirical evaluation of the design and function of a small marine reserve (Waikiki Marine Life Conservation District)

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TX0006382409 / 2006-06-30
Date of Publication:
September 24, 2003
Date of Creation:
2003
Title:
An empirical evaluation of the design and function of a small marine reserve (Waikiki Marine Life Conservation District)
Rights and Permissions:
Rights and permissions info. on CORDS appl. in CO.
Copyright Note:
Electronic registration.
Description:
Computer text data.
Copyright Claimant:
Carl G. Meyer
Authorship on Application:
entire text: Carl G. Meyer.
Names:
Carl G. Meyer

Cryptography

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000020236 / 1979-05-01
Date of Creation:
1979
Title:
Cryptography : a primer / Alan G. Konheim.
Description:
1 v.
Number of similar titles:
24
Variant title:
Cryptography : a primer
Copyright Claimant:
Alan G. Konheim
Names:
Alan G. Konheim 1934-

How to play tarami

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000037524 / 1980-02-04
Date of Creation:
1980
Title:
How to play tarami.
Description:
3 p.
Copyright Claimant:
Carl F. Meyer, Ida N. Meyer, Charles B. Meyer & Susan E. Meyer
Authorship on Application:
Carl F. Meyer, Ida N. Meyer, Susan E. Meyer, Charles B. Meyer.
Names:
Charles B. Meyer 1959-
Susan E. Meyer 1953-
Ida N. Meyer 1930-
Carl F. Meyer 1930-

Cryptography

Type of Work:
Non-dramatic literary work
Registration Number / Date:
TXu000575381 / 1993-09-14
Date of Creation:
1993
Title:
Cryptography.
Description:
Source code printout + 1 v.
Number of similar titles:
24
Copyright Claimant:
Andrew B. Peck, 1950-
Notes:
Computer program and documentation.
Names:
Andrew B. Peck 1950-

This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible. Multiple persons can share the same name.