by
Ciampa, Mark D., author.
Format:
Books
Publication Date
2015
Excerpt:
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
tools -- Cryptography -- Physical security -- Implementing information security -- Security and
by
Fadia, Ankit, 1985-
Format:
Books
Publication Date
2006
Excerpt:
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
by
Smith, Peter G., 1977-
Table of contents http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html
Format:
Electronic Resources
Publication Date
2005
Excerpt:
firewall script -- D. Complete firewall script -- E. Cryptography.
by
Deitel, Harvey M., 1945-
Format:
Books
Publication Date
2001
Excerpt:
-key Cryptography Public Key Cryptography Key Agreement Protocols Key Management Digital Signatures Public Key
by
Schneier, Bruce, 1963-
Table of contents Kostenfrei
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Format:
Books
Publication Date
2000
Excerpt:
cryptographie.
Limit Search Results
Narrowed by: