byÂ
Talbot, John.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2006296276-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Complexity and cryptography : an introduction / Talbot, John.
byÂ
Stallings, William.
Table of contents only http://www.loc.gov/catdir/toc/fy0608/2006276085.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Cryptography and network security : principles and practice / Stallings, William.
byÂ
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006927431.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
byÂ
Stanoyevitch, Alexander.
Format:Â
Books
Publication DateÂ
2011
Excerpt:Â
Introduction to cryptography with mathematical foundations and computer implementations /
byÂ
Graff, Jon.
Format:Â
Books
Publication DateÂ
2001
Excerpt:Â
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
byÂ
Whitman, Michael E., 1964- author.
Format:Â
Books
Publication DateÂ
2022
Excerpt:Â
tools -- Cryptography -- Implementing information security -- Information security maintenance.
byÂ
Stephens, Rod, 1961- author.
Format:Â
Books
Publication DateÂ
2019
Excerpt:Â
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
byÂ
Ciampa, Mark D., author.
Format:Â
Books
Publication DateÂ
2015
Excerpt:Â
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
byÂ
Pfleeger, Charles P., 1948- author.
Format:Â
Regular print
Publication DateÂ
2015
Excerpt:Â
signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
byÂ
Hellman, Erik, 1977-
Format:Â
Books
Publication DateÂ
2014
Excerpt:Â
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
byÂ
Andress, Jason.
Format:Â
Books
Publication DateÂ
2014
Excerpt:Â
control -- Auditing and ccountability -- Cryptography -- Laws and regulations -- Operations security
byÂ
Peeters, Eric, author.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
Cryptography.
byÂ
Jacobson, Douglas.
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
COMPUTERS / Security / Cryptography.
byÂ
Misra, Anmol.
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
Information -- 7.6.5.Cryptography -- 7.6.6.Conclusion -- 7.7.Summary --
byÂ
Mjølsnes, Stig F.
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
-- 3.3.Public Key Cryptography / S.O. Smalø -- 3.4.RSA-Public Key Cryptography / S.O. Smalø -- 3.5.RSA-Public-Key-Cryptography
byÂ
Ciampa, Mark D.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
fundamentals -- Authentication and account management -- Basic cryptography -- Advanced cryptography
byÂ
Whitman, Michael E., 1964-
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
tools -- Cryptography -- Physical security -- Implementing information security -- Security and
byÂ
Epp, Susanna S.
Format:Â
Books
Publication DateÂ
2011
Excerpt:Â
, computability, automata, cryptography, and combinatorics, students discover that the ideas of discrete
byÂ
Whitman, Michael E., 1964-.
Format:Â
Books
Publication DateÂ
2009
Excerpt:Â
datasikkerhed data security risikostyring risk management kryptografi cryptography.
byÂ
Whitman, Michael E., 1964-
Format:Â
Books
Publication DateÂ
2009
Excerpt:Â
security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11
byÂ
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:Â
Books
Publication DateÂ
2007
Excerpt:Â
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
byÂ
Gannon, Paul.
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Cryptography -- Great Britain -- History.
byÂ
Copeland, B. Jack, 1950-
Table of contents http://www.loc.gov/catdir/toc/ecip062/2005030993.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Cryptography -- Great Britain -- History.
byÂ
Pfennigwerth, Ian.
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
World War, 1939-1945 -- Cryptography.
byÂ
Fadia, Ankit, 1985-
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
byÂ
Shell-Gellasch, Amy.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005908422-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Format:Â
Books
Publication DateÂ
2005
Excerpt:Â
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
byÂ
Smith, Peter G., 1977-
Table of contents http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html
Format:Â
Electronic Resources
Publication DateÂ
2005
Excerpt:Â
firewall script -- D. Complete firewall script -- E. Cryptography.
byÂ
Buys, Reinhardt.
Format:Â
Books
Publication DateÂ
2004
Excerpt:Â
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
byÂ
Tanenbaum, Andrew S., 1944-
Safari Books Online http://proquest.safaribooksonline.com/0130661023
Format:Â
Books
Publication DateÂ
2003
Excerpt:Â
Domain Name System -- Electronic Mail -- World Wide Web -- Multimedia -- Network Security -- Cryptography
byÂ
Riggs, Cliff.
Format:Â
Books
Publication DateÂ
2003
Excerpt:Â
. Cryptography and VPN Terminology -- 5. Application Security Needs -- 6. Access Control -- 7. The Public Key
byÂ
Pfleeger, Charles P., 1948-
Format:Â
Books
Publication DateÂ
2003
Excerpt:Â
Security -- Ch. 9. Legal, Privacy, and Ethical Issues in Computer Security -- Ch. 10. Cryptography
byÂ
Stallings, William.
Format:Â
Books
Publication DateÂ
2003
Excerpt:Â
cryptographie.
byÂ
Goodrich, Michael T.
Format:Â
Books
Publication DateÂ
2002
Excerpt:Â
Processing -- 10. Number Theory and Cryptography -- 11. Network Algorithms -- IV. Additional Topics -- 12
byÂ
Deitel, Harvey M., 1945-
Format:Â
Books
Publication DateÂ
2001
Excerpt:Â
-key Cryptography Public Key Cryptography Key Agreement Protocols Key Management Digital Signatures Public Key
byÂ
Hofacker, Charles F.
Inhaltsverzeichnis
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Format:Â
Books
Publication DateÂ
2001
Excerpt:Â
Cryptography -- Techniques Used by Crackers -- Defenses Used.
byÂ
Schneier, Bruce, 1963-
Table of contents Kostenfrei
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Format:Â
Books
Publication DateÂ
2000
Excerpt:Â
cryptographie.
byÂ
Bauer, Friedrich L.
Format:Â
Books
Publication DateÂ
2000
Excerpt:Â
Cryptography.
byÂ
Grewlich, Klaus W.
Format:Â
Books
Publication DateÂ
1999
Excerpt:Â
), development and culture, consumer protection, cryptography, domain names and copyright. Lawyers, regulators
byÂ
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:Â
Books
Publication DateÂ
1996
Excerpt:Â
cryptographie.
byÂ
Singhal, Mukesh.
Table of contents http://www.loc.gov/catdir/toc/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Format:Â
Books
Publication DateÂ
1994
Excerpt:Â
Protection: Access and Flow Control -- 15. Data Security: Cryptography -- 16. Multiprocessor System
byÂ
Garfinkel, Simson.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html
Format:Â
Books
Publication DateÂ
1991
Excerpt:Â
cryptographie.