byÂ
Misra, Anmol.
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
Information -- 7.6.5.Cryptography -- 7.6.6.Conclusion -- 7.7.Summary --
byÂ
Peeters, Eric, author.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Format:Â
Books
Publication DateÂ
2013
Excerpt:Â
Cryptography.
byÂ
Mjølsnes, Stig F.
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
-- 3.3.Public Key Cryptography / S.O. Smalø -- 3.4.RSA-Public Key Cryptography / S.O. Smalø -- 3.5.RSA-Public-Key-Cryptography
byÂ
Ciampa, Mark D.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
fundamentals -- Authentication and account management -- Basic cryptography -- Advanced cryptography
byÂ
Whitman, Michael E., 1964-
Format:Â
Books
Publication DateÂ
2012
Excerpt:Â
tools -- Cryptography -- Physical security -- Implementing information security -- Security and
byÂ
Whitman, Michael E., 1964-.
Format:Â
Books
Publication DateÂ
2009
Excerpt:Â
datasikkerhed data security risikostyring risk management kryptografi cryptography.
byÂ
Whitman, Michael E., 1964-
Format:Â
Books
Publication DateÂ
2009
Excerpt:Â
security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11
byÂ
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:Â
Books
Publication DateÂ
2007
Excerpt:Â
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
byÂ
Fadia, Ankit, 1985-
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
byÂ
Gannon, Paul.
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Cryptography -- Great Britain -- History.
byÂ
Copeland, B. Jack, 1950-
Table of contents http://www.loc.gov/catdir/toc/ecip062/2005030993.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
Cryptography -- Great Britain -- History.
byÂ
Pfennigwerth, Ian.
Format:Â
Books
Publication DateÂ
2006
Excerpt:Â
World War, 1939-1945 -- Cryptography.
Limit Search Results
Narrowed by: