41 Results Found Subscribe to search results
000000000000IIE
Print
by 
Talbot, John.
Format: 
Books
Publication Date 
2006
Excerpt: 
Complexity and cryptography : an introduction / Talbot, John.
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography and network security : principles and practice / Stallings, William.
Available: Copies:
by 
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Format: 
Books
Publication Date 
2006
Excerpt: 
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Available: Copies:
by 
Stanoyevitch, Alexander.
Format: 
Books
Publication Date 
2011
Excerpt: 
Introduction to cryptography with mathematical foundations and computer implementations /
Available: Copies:
by 
Graff, Jon.
Format: 
Books
Publication Date 
2001
Excerpt: 
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
Available: Copies:
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2022
Excerpt: 
tools -- Cryptography -- Implementing information security -- Information security maintenance.
Available: Copies:
7. 
Cover image for Essential algorithms : a practical approach to computer algorithms using Python and C#
by 
Stephens, Rod, 1961- author.
Format: 
Books
Publication Date 
2019
Excerpt: 
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
Available: Copies:
8. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948- author.
Format: 
Regular print
Publication Date 
2015
Excerpt: 
signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
Available: Copies:
by 
Ciampa, Mark D., author.
Format: 
Books
Publication Date 
2015
Excerpt: 
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
Available: Copies:
10. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by 
Andress, Jason.
Format: 
Books
Publication Date 
2014
Excerpt: 
control -- Auditing and ccountability -- Cryptography -- Laws and regulations -- Operations security
Available: Copies:
by 
Hellman, Erik, 1977-
Format: 
Books
Publication Date 
2014
Excerpt: 
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
Available: Copies:
Limit Search Results
Access Level
Author
Format
Subject
Item Available