{
  "kind": "books#volumes",
  "totalItems": 1,
  "items": [
    {
      "kind": "books#volume",
      "id": "ZeEQAQAAMAAJ",
      "etag": "O1v9Wfo1Bu4",
      "selfLink": "https://www.googleapis.com/books/v1/volumes/ZeEQAQAAMAAJ",
      "volumeInfo": {
        "title": "Internet Cryptography",
        "authors": [
          "Richard E. Smith"
        ],
        "publisher": "Addison-Wesley Professional",
        "publishedDate": "1997",
        "description": "Cryptography is the modern, mathematically based version of the ancient art of secret codes. Written by the top expert for secure U.S. government communications, this book clearly explains the different categories of cryptographic products available, reveals their pros and cons, and demonstrates how they solve various Internet security challenges.",
        "industryIdentifiers": [
          {
            "type": "OTHER",
            "identifier": "UOM:49015002642024"
          }
        ],
        "readingModes": {
          "text": false,
          "image": false
        },
        "pageCount": 388,
        "printType": "BOOK",
        "categories": [
          "Computers"
        ],
        "maturityRating": "NOT_MATURE",
        "allowAnonLogging": false,
        "contentVersion": "0.4.1.0.preview.0",
        "panelizationSummary": {
          "containsEpubBubbles": false,
          "containsImageBubbles": false
        },
        "imageLinks": {
          "smallThumbnail": "http://books.google.com/books/content?id=ZeEQAQAAMAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api",
          "thumbnail": "http://books.google.com/books/content?id=ZeEQAQAAMAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api"
        },
        "language": "en",
        "previewLink": "http://books.google.com/books?id=ZeEQAQAAMAAJ&dq=isbn:0201924803&hl=&cd=1&source=gbs_api",
        "infoLink": "http://books.google.com/books?id=ZeEQAQAAMAAJ&dq=isbn:0201924803&hl=&source=gbs_api",
        "canonicalVolumeLink": "https://books.google.com/books/about/Internet_Cryptography.html?hl=&id=ZeEQAQAAMAAJ"
      },
      "saleInfo": {
        "country": "US",
        "saleability": "NOT_FOR_SALE",
        "isEbook": false
      },
      "accessInfo": {
        "country": "US",
        "viewability": "NO_PAGES",
        "embeddable": false,
        "publicDomain": false,
        "textToSpeechPermission": "ALLOWED",
        "epub": {
          "isAvailable": false
        },
        "pdf": {
          "isAvailable": false
        },
        "webReaderLink": "http://play.google.com/books/reader?id=ZeEQAQAAMAAJ&hl=&source=gbs_api",
        "accessViewStatus": "NONE",
        "quoteSharingAllowed": false
      },
      "searchInfo": {
        "textSnippet": "&quot;This book provides an excellent overview of how encryption is used, its strengths and weaknesses, and what to look for when building or choosing real-world solutions."
      }
    }
  ]
}
