by
Shell-Gellasch, Amy.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005908422-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Format:
Books
Publication Date
2005
Excerpt:
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
by
Buys, Reinhardt.
Format:
Books
Publication Date
2004
Excerpt:
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
2003
Excerpt:
Security -- Ch. 9. Legal, Privacy, and Ethical Issues in Computer Security -- Ch. 10. Cryptography
by
Riggs, Cliff.
Format:
Books
Publication Date
2003
Excerpt:
. Cryptography and VPN Terminology -- 5. Application Security Needs -- 6. Access Control -- 7. The Public Key
by
Stallings, William.
Format:
Books
Publication Date
2003
Excerpt:
cryptographie.
by
Deitel, Harvey M., 1945-
Format:
Books
Publication Date
2001
Excerpt:
-key Cryptography Public Key Cryptography Key Agreement Protocols Key Management Digital Signatures Public Key
by
Hofacker, Charles F.
Inhaltsverzeichnis
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Format:
Books
Publication Date
2001
Excerpt:
Cryptography -- Techniques Used by Crackers -- Defenses Used.
by
Bauer, Friedrich L.
Format:
Books
Publication Date
2000
Excerpt:
Cryptography.
by
Schneier, Bruce, 1963-
Table of contents Kostenfrei
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Format:
Books
Publication Date
2000
Excerpt:
cryptographie.
by
Grewlich, Klaus W.
Format:
Books
Publication Date
1999
Excerpt:
), development and culture, consumer protection, cryptography, domain names and copyright. Lawyers, regulators
by
Singhal, Mukesh.
Table of contents http://www.loc.gov/catdir/toc/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Format:
Books
Publication Date
1994
Excerpt:
Protection: Access and Flow Control -- 15. Data Security: Cryptography -- 16. Multiprocessor System
Limit Search Results
Narrowed by:


