41 Results Found Subscribe to search results
00000000000000000000000000000000000000000IIE
Print
by 
Talbot, John.
Format: 
Books
Publication Date 
2006
Excerpt: 
Complexity and cryptography : an introduction / Talbot, John.
Available: Copies:
2. 
Cover image for Cryptography and network security : principles and practice
by 
Stallings, William.
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography and network security : principles and practice / Stallings, William.
Available: Copies:
3. 
Cover image for Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
by 
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Format: 
Books
Publication Date 
2006
Excerpt: 
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Available: Copies:
4. 
Cover image for Introduction to cryptography with mathematical foundations and computer implementations
by 
Stanoyevitch, Alexander.
Format: 
Books
Publication Date 
2011
Excerpt: 
Introduction to cryptography with mathematical foundations and computer implementations /
Available: Copies:
5. 
Cover image for Cryptography and e-commerce : a Wiley tech brief
by 
Graff, Jon.
Format: 
Books
Publication Date 
2001
Excerpt: 
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
Available: Copies:
6. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964- author.
Format: 
Books
Publication Date 
2022
Excerpt: 
tools -- Cryptography -- Implementing information security -- Information security maintenance.
Available: Copies:
7. 
Cover image for Essential algorithms : a practical approach to computer algorithms using Python and C#
by 
Stephens, Rod, 1961- author.
Format: 
Books
Publication Date 
2019
Excerpt: 
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
Available: Copies:
8. 
Cover image for CompTIA security+ guide to network security fundamentals
by 
Ciampa, Mark D., author.
Format: 
Books
Publication Date 
2015
Excerpt: 
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
Available: Copies:
9. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948- author.
Format: 
Regular print
Publication Date 
2015
Excerpt: 
signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
Available: Copies:
10. 
Cover image for Android programming : pushing the limits
by 
Hellman, Erik, 1977-
Format: 
Books
Publication Date 
2014
Excerpt: 
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
Available: Copies:
11. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by 
Andress, Jason.
Format: 
Books
Publication Date 
2014
Excerpt: 
control -- Auditing and ccountability -- Cryptography -- Laws and regulations -- Operations security
Available: Copies:
13. 
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
COMPUTERS / Security / Cryptography.
Available: Copies:
14. 
Cover image for Android security : attacks and defenses
by 
Misra, Anmol.
Format: 
Books
Publication Date 
2013
Excerpt: 
Information -- 7.6.5.Cryptography -- 7.6.6.Conclusion -- 7.7.Summary --
Available: Copies:
15. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
-- 3.3.Public Key Cryptography / S.O. Smalø -- 3.4.RSA-Public Key Cryptography / S.O. Smalø -- 3.5.RSA-Public-Key-Cryptography
Available: Copies:
16. 
Cover image for Security+ guide to network security fundamentals
by 
Ciampa, Mark D.
Format: 
Books
Publication Date 
2012
Excerpt: 
fundamentals -- Authentication and account management -- Basic cryptography -- Advanced cryptography
Available: Copies:
17. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
tools -- Cryptography -- Physical security -- Implementing information security -- Security and
Available: Copies:
18. 
Cover image for Discrete mathematics with applications
by 
Epp, Susanna S.
Format: 
Books
Publication Date 
2011
Excerpt: 
, computability, automata, cryptography, and combinatorics, students discover that the ideas of discrete
Available: Copies:
by 
Whitman, Michael E., 1964-.
Format: 
Books
Publication Date 
2009
Excerpt: 
datasikkerhed data security risikostyring risk management kryptografi cryptography.
Available: Copies:
20. 
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11
Available: Copies:
21. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2007
Excerpt: 
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
Available: Copies:
22. 
Cover image for Colossus : Bletchley Park's greatest secret
by 
Gannon, Paul.
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography -- Great Britain -- History.
Available: Copies:
23. 
Cover image for Colossus : the secrets of Bletchley Park's codebreaking computers
by 
Copeland, B. Jack, 1950-
Format: 
Books
Publication Date 
2006
Excerpt: 
Cryptography -- Great Britain -- History.
Available: Copies:
24. 
Cover image for A man of intelligence : the life of Captain Eric Nave, codebreaker extraordinary
by 
Pfennigwerth, Ian.
Format: 
Books
Publication Date 
2006
Excerpt: 
World War, 1939-1945 -- Cryptography.
Available: Copies:
25. 
Cover image for The unofficial guide to ethical hacking
by 
Fadia, Ankit, 1985-
Format: 
Books
Publication Date 
2006
Excerpt: 
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
Available: Copies:
26. 
Cover image for From calculus to computers : using the last 200 years of mathematics history in the classroom
by 
Shell-Gellasch, Amy.
Format: 
Books
Publication Date 
2005
Excerpt: 
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
Available: Copies:
27. 
Cover image for Linux network security
by 
Smith, Peter G., 1977-
Format: 
Electronic Resources
Publication Date 
2005
Excerpt: 
firewall script -- D. Complete firewall script -- E. Cryptography.
Available: Copies:
by 
Buys, Reinhardt.
Format: 
Books
Publication Date 
2004
Excerpt: 
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
Available: Copies:
29. 
Cover image for Computer networks
by 
Tanenbaum, Andrew S., 1944-
Format: 
Books
Publication Date 
2003
Excerpt: 
Domain Name System -- Electronic Mail -- World Wide Web -- Multimedia -- Network Security -- Cryptography
Available: Copies:
by 
Riggs, Cliff.
Format: 
Books
Publication Date 
2003
Excerpt: 
. Cryptography and VPN Terminology -- 5. Application Security Needs -- 6. Access Control -- 7. The Public Key
Available: Copies:
31. 
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948-
Format: 
Books
Publication Date 
2003
Excerpt: 
Security -- Ch. 9. Legal, Privacy, and Ethical Issues in Computer Security -- Ch. 10. Cryptography
Available: Copies:
by 
Stallings, William.
Format: 
Books
Publication Date 
2003
Excerpt: 
cryptographie.
Available: Copies:
33. 
Cover image for Algorithm design : foundations, analysis, and Internet examples
by 
Goodrich, Michael T.
Format: 
Books
Publication Date 
2002
Excerpt: 
Processing -- 10. Number Theory and Cryptography -- 11. Network Algorithms -- IV. Additional Topics -- 12
Available: Copies:
34. 
Cover image for E-business & e-commerce : how to program
by 
Deitel, Harvey M., 1945-
Format: 
Books
Publication Date 
2001
Excerpt: 
-key Cryptography Public Key Cryptography Key Agreement Protocols Key Management Digital Signatures Public Key
Available: Copies:
35. 
Cover image for Internet marketing
36. 
Cover image for Secrets and lies : digital security in a networked world
by 
Schneier, Bruce, 1963-
Format: 
Books
Publication Date 
2000
Excerpt: 
cryptographie.
Available: Copies:
by 
Bauer, Friedrich L.
Format: 
Books
Publication Date 
2000
Excerpt: 
Cryptography.
Available: Copies:
38. 
Cover image for Governance in "cyberspace" : access and public interest in global communications
by 
Grewlich, Klaus W.
Format: 
Books
Publication Date 
1999
Excerpt: 
), development and culture, consumer protection, cryptography, domain names and copyright. Lawyers, regulators
Available: Copies:
39. 
Cover image for Practical UNIX and Internet security
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1996
Excerpt: 
cryptographie.
Available: Copies:
by 
Singhal, Mukesh.
Format: 
Books
Publication Date 
1994
Excerpt: 
Protection: Access and Flow Control -- 15. Data Security: Cryptography -- 16. Multiprocessor System
Available: Copies:
by 
Garfinkel, Simson.
Format: 
Books
Publication Date 
1991
Excerpt: 
cryptographie.
Available: Copies:
Limit Search Results
Access Level
Author
Format
Language
Subject
Item Available