This HTML5 document contains 55 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
wdthttp://www.wikidata.org/prop/direct/
wdtnhttp://www.wikidata.org/prop/direct-normalized/
n12http://www.worldcat.org/oclc/
n10http://openlibrary.org/works/
schemahttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
wikibasehttp://wikiba.se/ontology#
phttp://www.wikidata.org/prop/
n11urn:ISBN:
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
xsdhhttp://www.w3.org/2001/XMLSchema#
wdshttp://www.wikidata.org/entity/statement/
wdhttp://www.wikidata.org/entity/

Statements

Subject Item
wd:Q21898100
rdf:type
wikibase:Item
schema:description
libro de Bruce Schneier Buch von Bruce Schneier second edition published November 2nd 1995 by Wiley, hardcover deuxième édition publiée le 2 novembre 1995 du livre de Bruce Schneier, livre cartonné boek van Bruce Schneier
p:P577
wds:Q21898100-389EE272-AA4C-4C32-9E68-D47E6C4A7E25 wds:Q21898100-e524ead9-4129-1cdf-db46-8fb50c48a594
wdt:P577
1995-11-02T00:00:00Z
p:P407
wds:Q21898100-12AF90FD-47D4-4575-9A79-E71F0E89067D
wdt:P407
wd:Q1860
p:P2969
wds:Q21898100-6F3E6188-C293-4051-9226-C006CD1E4067
wdt:P2969
351301
rdfs:label
Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C
skos:prefLabel
Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C
schema:name
Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C Applied Cryptography. Protocols, Algorithms, and Source Code in C
p:P50
wds:Q21898100-1d56fe58-4de9-b275-56ac-905f8ebb1786
wdt:P50
wd:Q368328
p:P1476
wds:Q21898100-F88B299A-8822-4D5E-AC0A-217C6EAD367E
wdt:P1476
Applied Cryptography
p:P957
wds:Q21898100-67FAA96A-8217-47C2-A48B-21472BEB959A
wdtn:P957
n11:0-471-12845-7
wdt:P957
0-471-12845-7
p:P31
wds:Q21898100-98CD7BB0-9E25-469A-A661-A7598214216D
wdt:P31
wd:Q3331189
p:P123
wds:Q21898100-64931A3A-189A-48FC-826B-CFDA90CF2FD7
p:P1680
wds:Q21898100-4A6EFD3F-D9E2-44FA-9B92-61E0EE9B7224
p:P437
wds:Q21898100-afdb3fdd-4ce8-2a5d-5e97-357fdb0c94e4
wdt:P123
wd:Q1479654
wdt:P1680
Protocols, Algorithms, and Source Code in C
wdt:P437
wd:Q193955
p:P1104
wds:Q21898100-64E626B6-4BF5-46F6-B652-A562C3C2A503
wdt:P1104
784
p:P243
wds:Q21898100-421f6d26-4f89-df20-f5b6-7ec7212d76fa
wdtn:P243
n12:874676137
wdt:P243
874676137
p:P629
wds:Q21898100-e8d7e02d-4355-99cd-d528-82aaea28dbfe
p:P648
wds:Q21898100-00057664-f7ee-4f92-9b9f-a03ac6c4ab29
wdtn:P648
n10:OL7612292M
wdt:P629
wd:Q538726
wdt:P648
OL7612292M
p:P393
wds:Q21898100-E1B4EFF7-123F-4946-85E3-AD6DEFBDFF62
wdt:P393
2
p:P212
wds:Q21898100-02A0085C-0D6C-4B64-8E70-BBB746DD66E2
wdtn:P212
n11:978-0-471-12845-8
wdt:P212
978-0-471-12845-8