by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2022
Excerpt:
tools -- Cryptography -- Implementing information security -- Information security maintenance.
by
Ciampa, Mark D., author.
Format:
Books
Publication Date
2015
Excerpt:
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
by
Hellman, Erik, 1977-
Format:
Books
Publication Date
2014
Excerpt:
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
by
Ciampa, Mark D.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Format:
Books
Publication Date
2012
Excerpt:
fundamentals -- Authentication and account management -- Basic cryptography -- Advanced cryptography
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
tools -- Cryptography -- Physical security -- Implementing information security -- Security and
by
Fadia, Ankit, 1985-
Format:
Books
Publication Date
2006
Excerpt:
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
by
Smith, Peter G., 1977-
Table of contents http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html
Format:
Electronic Resources
Publication Date
2005
Excerpt:
firewall script -- D. Complete firewall script -- E. Cryptography.
by
Buys, Reinhardt.
Format:
Books
Publication Date
2004
Excerpt:
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
Limit Search Results
Narrowed by: