by
Talbot, John.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2006296276-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Format:
Books
Publication Date
2006
Excerpt:
Complexity and cryptography : an introduction / Talbot, John.
by
Stallings, William.
Table of contents only http://www.loc.gov/catdir/toc/fy0608/2006276085.html
Format:
Books
Publication Date
2006
Excerpt:
Cryptography and network security : principles and practice / Stallings, William.
by
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006927431.html
Format:
Books
Publication Date
2006
Excerpt:
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
by
Stanoyevitch, Alexander.
Format:
Books
Publication Date
2011
Excerpt:
Introduction to cryptography with mathematical foundations and computer implementations /
by
Graff, Jon.
Format:
Books
Publication Date
2001
Excerpt:
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2022
Excerpt:
tools -- Cryptography -- Implementing information security -- Information security maintenance.
by
Stephens, Rod, 1961- author.
Format:
Books
Publication Date
2019
Excerpt:
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
by
Hellman, Erik, 1977-
Format:
Books
Publication Date
2014
Excerpt:
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
by
Peeters, Eric, author.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Format:
Books
Publication Date
2013
Excerpt:
Cryptography.
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
COMPUTERS / Security / Cryptography.
by
Misra, Anmol.
Format:
Books
Publication Date
2013
Excerpt:
Information -- 7.6.5.Cryptography -- 7.6.6.Conclusion -- 7.7.Summary --
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
-- 3.3.Public Key Cryptography / S.O. Smalø -- 3.4.RSA-Public Key Cryptography / S.O. Smalø -- 3.5.RSA-Public-Key-Cryptography
by
Whitman, Michael E., 1964-.
Format:
Books
Publication Date
2009
Excerpt:
datasikkerhed data security risikostyring risk management kryptografi cryptography.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11
by
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:
Books
Publication Date
2007
Excerpt:
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
by
Gannon, Paul.
Format:
Books
Publication Date
2006
Excerpt:
Cryptography -- Great Britain -- History.
by
Copeland, B. Jack, 1950-
Table of contents http://www.loc.gov/catdir/toc/ecip062/2005030993.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Format:
Books
Publication Date
2006
Excerpt:
Cryptography -- Great Britain -- History.
by
Shell-Gellasch, Amy.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005908422-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Format:
Books
Publication Date
2005
Excerpt:
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
by
Buys, Reinhardt.
Format:
Books
Publication Date
2004
Excerpt:
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
by
Tanenbaum, Andrew S., 1944-
Safari Books Online http://proquest.safaribooksonline.com/0130661023
Format:
Books
Publication Date
2003
Excerpt:
Domain Name System -- Electronic Mail -- World Wide Web -- Multimedia -- Network Security -- Cryptography
by
Riggs, Cliff.
Format:
Books
Publication Date
2003
Excerpt:
. Cryptography and VPN Terminology -- 5. Application Security Needs -- 6. Access Control -- 7. The Public Key
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
2003
Excerpt:
Security -- Ch. 9. Legal, Privacy, and Ethical Issues in Computer Security -- Ch. 10. Cryptography
by
Goodrich, Michael T.
Format:
Books
Publication Date
2002
Excerpt:
Processing -- 10. Number Theory and Cryptography -- 11. Network Algorithms -- IV. Additional Topics -- 12
by
Bauer, Friedrich L.
Format:
Books
Publication Date
2000
Excerpt:
Cryptography.
by
Grewlich, Klaus W.
Format:
Books
Publication Date
1999
Excerpt:
), development and culture, consumer protection, cryptography, domain names and copyright. Lawyers, regulators
26.
by
Singhal, Mukesh.
Table of contents http://www.loc.gov/catdir/toc/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Format:
Books
Publication Date
1994
Excerpt:
Protection: Access and Flow Control -- 15. Data Security: Cryptography -- 16. Multiprocessor System