26 Results Found Subscribe to search results
00000000000000000000000000IIE
Print
by 
Talbot, John.
Format: 
Books
Publication Date 
2006
Excerpt: 
Complexity and cryptography : an introduction / Talbot, John.
Available: Copies:
2. 
Cover image for Cryptography and network security : principles and practice
by 
Stallings, William.
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography and network security : principles and practice / Stallings, William.
Available: Copies:
3. 
Cover image for Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
by 
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Format: 
Books
Publication Date 
2006
Excerpt: 
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Available: Copies:
4. 
Cover image for Introduction to cryptography with mathematical foundations and computer implementations
by 
Stanoyevitch, Alexander.
Format: 
Books
Publication Date 
2011
Excerpt: 
Introduction to cryptography with mathematical foundations and computer implementations /
Available: Copies:
5. 
Cover image for Cryptography and e-commerce : a Wiley tech brief
by 
Graff, Jon.
Format: 
Books
Publication Date 
2001
Excerpt: 
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
Available: Copies:
6. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2022
Excerpt: 
tools -- Cryptography -- Implementing information security -- Information security maintenance.
Available: Copies:
7. 
Cover image for Essential algorithms : a practical approach to computer algorithms using Python and C#
by 
Stephens, Rod, 1961- author.
Format: 
Books
Publication Date 
2019
Excerpt: 
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
Available: Copies:
8. 
Cover image for Android programming : pushing the limits
by 
Hellman, Erik, 1977-
Format: 
Books
Publication Date 
2014
Excerpt: 
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
Available: Copies:
10. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
COMPUTERS / Security / Cryptography.
Available: Copies:
11. 
Cover image for Android security : attacks and defenses
by 
Misra, Anmol.
Format: 
Books
Publication Date 
2013
Excerpt: 
Information -- 7.6.5.Cryptography -- 7.6.6.Conclusion -- 7.7.Summary --
Available: Copies:
12. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
-- 3.3.Public Key Cryptography / S.O. Smalø -- 3.4.RSA-Public Key Cryptography / S.O. Smalø -- 3.5.RSA-Public-Key-Cryptography
Available: Copies:
by 
Whitman, Michael E., 1964-.
Format: 
Books
Publication Date 
2009
Excerpt: 
datasikkerhed data security risikostyring risk management kryptografi cryptography.
Available: Copies:
14. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11
Available: Copies:
15. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
Available: Copies:
16. 
Cover image for Colossus : Bletchley Park's greatest secret
by 
Gannon, Paul.
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography -- Great Britain -- History.
Available: Copies:
17. 
Cover image for Colossus : the secrets of Bletchley Park's codebreaking computers
by 
Copeland, B. Jack, 1950-
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography -- Great Britain -- History.
Available: Copies:
18. 
Cover image for From calculus to computers : using the last 200 years of mathematics history in the classroom
by 
Shell-Gellasch, Amy.
Format: 
Books
Publication Date 
2005
Excerpt: 
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
Available: Copies:
by 
Buys, Reinhardt.
Format: 
Books
Publication Date 
2004
Excerpt: 
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
Available: Copies:
20. 
Cover image for Computer networks
by 
Tanenbaum, Andrew S., 1944-
Format: 
Books
Publication Date 
2003
Excerpt: 
Domain Name System -- Electronic Mail -- World Wide Web -- Multimedia -- Network Security -- Cryptography
Available: Copies:
by 
Riggs, Cliff.
Format: 
Books
Publication Date 
2003
Excerpt: 
. Cryptography and VPN Terminology -- 5. Application Security Needs -- 6. Access Control -- 7. The Public Key
Available: Copies:
22. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
Security -- Ch. 9. Legal, Privacy, and Ethical Issues in Computer Security -- Ch. 10. Cryptography
Available: Copies:
23. 
Cover image for Algorithm design : foundations, analysis, and Internet examples
by 
Goodrich, Michael T.
Format: 
Books
Publication Date 
2002
Excerpt: 
Processing -- 10. Number Theory and Cryptography -- 11. Network Algorithms -- IV. Additional Topics -- 12
Available: Copies:
by 
Bauer, Friedrich L.
Format: 
Books
Publication Date 
2000
Excerpt: 
Cryptography.
Available: Copies:
25. 
Cover image for Governance in "cyberspace" : access and public interest in global communications
by 
Grewlich, Klaus W.
Format: 
Books
Publication Date 
1999
Excerpt: 
), development and culture, consumer protection, cryptography, domain names and copyright. Lawyers, regulators
Available: Copies:
by 
Singhal, Mukesh.
Format: 
Books
Publication Date 
1994
Excerpt: 
Protection: Access and Flow Control -- 15. Data Security: Cryptography -- 16. Multiprocessor System
Available: Copies:
Limit Search Results
Access Level
Format
Item Category 1
Language
Subject
Item Available