by
Fadia, Ankit, 1985-
Format:
Books
Publication Date
2006
Excerpt:
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
by
Smith, Peter G., 1977-
Table of contents http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html
Format:
Electronic Resources
Publication Date
2005
Excerpt:
firewall script -- D. Complete firewall script -- E. Cryptography.
by
Shell-Gellasch, Amy.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005908422-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Format:
Books
Publication Date
2005
Excerpt:
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
by
Buys, Reinhardt.
Format:
Books
Publication Date
2004
Excerpt:
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
by
Tanenbaum, Andrew S., 1944-
Safari Books Online http://proquest.safaribooksonline.com/0130661023
Format:
Books
Publication Date
2003
Excerpt:
Domain Name System -- Electronic Mail -- World Wide Web -- Multimedia -- Network Security -- Cryptography
by
Riggs, Cliff.
Format:
Books
Publication Date
2003
Excerpt:
. Cryptography and VPN Terminology -- 5. Application Security Needs -- 6. Access Control -- 7. The Public Key
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
2003
Excerpt:
Security -- Ch. 9. Legal, Privacy, and Ethical Issues in Computer Security -- Ch. 10. Cryptography
by
Stallings, William.
Format:
Books
Publication Date
2003
Excerpt:
cryptographie.
by
Goodrich, Michael T.
Format:
Books
Publication Date
2002
Excerpt:
Processing -- 10. Number Theory and Cryptography -- 11. Network Algorithms -- IV. Additional Topics -- 12
by
Deitel, Harvey M., 1945-
Format:
Books
Publication Date
2001
Excerpt:
-key Cryptography Public Key Cryptography Key Agreement Protocols Key Management Digital Signatures Public Key
by
Hofacker, Charles F.
Inhaltsverzeichnis
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Format:
Books
Publication Date
2001
Excerpt:
Cryptography -- Techniques Used by Crackers -- Defenses Used.
by
Schneier, Bruce, 1963-
Table of contents Kostenfrei
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Format:
Books
Publication Date
2000
Excerpt:
cryptographie.
Limit Search Results
Narrowed by: