by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2022
Excerpt:
tools -- Cryptography -- Implementing information security -- Information security maintenance.
by
Stephens, Rod, 1961- author.
Format:
Books
Publication Date
2019
Excerpt:
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
by
Ciampa, Mark D., author.
Format:
Books
Publication Date
2015
Excerpt:
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
by
Hellman, Erik, 1977-
Format:
Books
Publication Date
2014
Excerpt:
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
by
Andress, Jason.
Format:
Books
Publication Date
2014
Excerpt:
control -- Auditing and ccountability -- Cryptography -- Laws and regulations -- Operations security