11 Results Found Subscribe to search results
00000000000IIE
Print
by 
Talbot, John.
Format: 
Books
Publication Date 
2006
Excerpt: 
Complexity and cryptography : an introduction / Talbot, John.
Available: Copies:
2. 
Cover image for Cryptography and network security : principles and practice
by 
Stallings, William.
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography and network security : principles and practice / Stallings, William.
Available: Copies:
3. 
Cover image for Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
by 
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Format: 
Books
Publication Date 
2006
Excerpt: 
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Available: Copies:
4. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
Available: Copies:
5. 
Cover image for Colossus : Bletchley Park's greatest secret
by 
Gannon, Paul.
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography -- Great Britain -- History.
Available: Copies:
6. 
Cover image for Colossus : the secrets of Bletchley Park's codebreaking computers
by 
Copeland, B. Jack, 1950-
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography -- Great Britain -- History.
Available: Copies:
7. 
Cover image for A man of intelligence : the life of Captain Eric Nave, codebreaker extraordinary
by 
Pfennigwerth, Ian.
Format: 
Books
Publication Date 
2006
Excerpt: 
World War, 1939-1945 -- Cryptography.
Available: Copies:
8. 
Cover image for The unofficial guide to ethical hacking
by 
Fadia, Ankit, 1985-
Format: 
Books
Publication Date 
2006
Excerpt: 
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
Available: Copies:
9. 
Cover image for From calculus to computers : using the last 200 years of mathematics history in the classroom
by 
Shell-Gellasch, Amy.
Format: 
Books
Publication Date 
2005
Excerpt: 
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
Available: Copies:
10. 
Cover image for Linux network security
by 
Smith, Peter G., 1977-
Format: 
Electronic Resources
Publication Date 
2005
Excerpt: 
firewall script -- D. Complete firewall script -- E. Cryptography.
Available: Copies:
by 
Buys, Reinhardt.
Format: 
Books
Publication Date 
2004
Excerpt: 
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
Available: Copies:
Limit Search Results
Access Level
Format
Item Category 1
Material Type
Language
Shelf Location
Publication Date
Item Available