by 
 Talbot, John.
 Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2006296276-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Format: 
Books
Publication Date 
 2006
Excerpt: 
Complexity and cryptography : an introduction / Talbot, John.
by 
 Stallings, William.
 Table of contents only http://www.loc.gov/catdir/toc/fy0608/2006276085.html
Format: 
Books
Publication Date 
 2006
Excerpt: 
Cryptography and network security : principles and practice / Stallings, William.
by 
 International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
 Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006927431.html
Format: 
Books
Publication Date 
 2006
Excerpt: 
 : revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
by 
 Stanoyevitch, Alexander.
Format: 
Books
Publication Date 
 2011
Excerpt: 
Introduction to cryptography with mathematical foundations and computer implementations /
by 
 Graff, Jon.
Format: 
Books
Publication Date 
 2001
Excerpt: 
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
by 
 Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
 2022
Excerpt: 
 tools -- Cryptography -- Implementing information security -- Information security maintenance.
by 
 Stephens, Rod, 1961- author.
Format: 
Books
Publication Date 
 2019
Excerpt: 
 network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
by 
 Pfleeger, Charles P., 1948- author.
Format: 
Regular print
Publication Date 
 2015
Excerpt: 
 signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
by 
 Ciampa, Mark D., author.
Format: 
Books
Publication Date 
 2015
Excerpt: 
 based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
by 
 Andress, Jason.
Format: 
Books
Publication Date 
 2014
Excerpt: 
 control -- Auditing and ccountability -- Cryptography -- Laws and regulations -- Operations security
by 
 Hellman, Erik, 1977-
Format: 
Books
Publication Date 
 2014
Excerpt: 
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
by 
 Peeters, Eric, author.
 Table of contents http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Format: 
Books
Publication Date 
 2013
Excerpt: 
Cryptography.
Limit Search Results





