by
Talbot, John.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2006296276-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Format:
Books
Publication Date
2006
Excerpt:
Complexity and cryptography : an introduction / Talbot, John.
by
Stallings, William.
Table of contents only http://www.loc.gov/catdir/toc/fy0608/2006276085.html
Format:
Books
Publication Date
2006
Excerpt:
Cryptography and network security : principles and practice / Stallings, William.
by
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006927431.html
Format:
Books
Publication Date
2006
Excerpt:
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
by
Stanoyevitch, Alexander.
Format:
Books
Publication Date
2011
Excerpt:
Introduction to cryptography with mathematical foundations and computer implementations /
by
Graff, Jon.
Format:
Books
Publication Date
2001
Excerpt:
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2022
Excerpt:
tools -- Cryptography -- Implementing information security -- Information security maintenance.
by
Stephens, Rod, 1961- author.
Format:
Books
Publication Date
2019
Excerpt:
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
by
Ciampa, Mark D., author.
Format:
Books
Publication Date
2015
Excerpt:
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
by
Hellman, Erik, 1977-
Format:
Books
Publication Date
2014
Excerpt:
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
by
Andress, Jason.
Format:
Books
Publication Date
2014
Excerpt:
control -- Auditing and ccountability -- Cryptography -- Laws and regulations -- Operations security
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
COMPUTERS / Security / Cryptography.
Limit Search Results