by
Talbot, John.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2006296276-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html
Format:
Books
Publication Date
2006
Excerpt:
Complexity and cryptography : an introduction / Talbot, John.
by
Stallings, William.
Table of contents only http://www.loc.gov/catdir/toc/fy0608/2006276085.html
Format:
Books
Publication Date
2006
Excerpt:
Cryptography and network security : principles and practice / Stallings, William.
by
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006927431.html
Format:
Books
Publication Date
2006
Excerpt:
: revised selected papers / International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
by
Stanoyevitch, Alexander.
Format:
Books
Publication Date
2011
Excerpt:
Introduction to cryptography with mathematical foundations and computer implementations /
by
Graff, Jon.
Format:
Books
Publication Date
2001
Excerpt:
Cryptography and e-commerce : a Wiley tech brief / Graff, Jon.
by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2022
Excerpt:
tools -- Cryptography -- Implementing information security -- Information security maintenance.
by
Stephens, Rod, 1961- author.
Format:
Books
Publication Date
2019
Excerpt:
network algorithms -- String algorithms -- Cryptography -- Complexity theory-- Distributed algorithms
by
Ciampa, Mark D., author.
Format:
Books
Publication Date
2015
Excerpt:
based attacks -- Host, application, and data security -- Basic cryptography -- Advanced cryptography
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
by
Hellman, Erik, 1977-
Format:
Books
Publication Date
2014
Excerpt:
; Perform background processing; Use Android cryptography APIs; Find and safely use hidden Android APIs
by
Andress, Jason.
Format:
Books
Publication Date
2014
Excerpt:
control -- Auditing and ccountability -- Cryptography -- Laws and regulations -- Operations security
by
Peeters, Eric, author.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html
Format:
Books
Publication Date
2013
Excerpt:
Cryptography.
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
COMPUTERS / Security / Cryptography.
by
Misra, Anmol.
Format:
Books
Publication Date
2013
Excerpt:
Information -- 7.6.5.Cryptography -- 7.6.6.Conclusion -- 7.7.Summary --
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
-- 3.3.Public Key Cryptography / S.O. Smalø -- 3.4.RSA-Public Key Cryptography / S.O. Smalø -- 3.5.RSA-Public-Key-Cryptography
by
Ciampa, Mark D.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
Table of contents only http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
Format:
Books
Publication Date
2012
Excerpt:
fundamentals -- Authentication and account management -- Basic cryptography -- Advanced cryptography
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
tools -- Cryptography -- Physical security -- Implementing information security -- Security and
by
Epp, Susanna S.
Format:
Books
Publication Date
2011
Excerpt:
, computability, automata, cryptography, and combinatorics, students discover that the ideas of discrete
by
Whitman, Michael E., 1964-.
Format:
Books
Publication Date
2009
Excerpt:
datasikkerhed data security risikostyring risk management kryptografi cryptography.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11
by
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:
Books
Publication Date
2007
Excerpt:
Ch. 1. Is there a security problem in computing? -- Ch. 2. Elementary cryptography -- Ch. 3
by
Gannon, Paul.
Format:
Books
Publication Date
2006
Excerpt:
Cryptography -- Great Britain -- History.
by
Copeland, B. Jack, 1950-
Table of contents http://www.loc.gov/catdir/toc/ecip062/2005030993.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html
Format:
Books
Publication Date
2006
Excerpt:
Cryptography -- Great Britain -- History.
by
Pfennigwerth, Ian.
Format:
Books
Publication Date
2006
Excerpt:
World War, 1939-1945 -- Cryptography.
by
Fadia, Ankit, 1985-
Format:
Books
Publication Date
2006
Excerpt:
attacks -- Denial of service (DOS) attacks -- Cryptography, firewalls, and error messages -- Batch file
by
Shell-Gellasch, Amy.
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005908422-d.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Table of contents http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html
Format:
Books
Publication Date
2005
Excerpt:
. McGuire -- Public key cryptography / Shai Simonson -- Introducing logic via Turing machines / Jerry M
by
Smith, Peter G., 1977-
Table of contents http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html
Format:
Electronic Resources
Publication Date
2005
Excerpt:
firewall script -- D. Complete firewall script -- E. Cryptography.
by
Buys, Reinhardt.
Format:
Books
Publication Date
2004
Excerpt:
-commerce patents -- 4. Electronic transactions -- 5. Cryptography and authentication -- 6. Online consumer
by
Tanenbaum, Andrew S., 1944-
Safari Books Online http://proquest.safaribooksonline.com/0130661023
Format:
Books
Publication Date
2003
Excerpt:
Domain Name System -- Electronic Mail -- World Wide Web -- Multimedia -- Network Security -- Cryptography
by
Riggs, Cliff.
Format:
Books
Publication Date
2003
Excerpt:
. Cryptography and VPN Terminology -- 5. Application Security Needs -- 6. Access Control -- 7. The Public Key
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
2003
Excerpt:
Security -- Ch. 9. Legal, Privacy, and Ethical Issues in Computer Security -- Ch. 10. Cryptography
by
Stallings, William.
Format:
Books
Publication Date
2003
Excerpt:
cryptographie.
by
Goodrich, Michael T.
Format:
Books
Publication Date
2002
Excerpt:
Processing -- 10. Number Theory and Cryptography -- 11. Network Algorithms -- IV. Additional Topics -- 12
by
Deitel, Harvey M., 1945-
Format:
Books
Publication Date
2001
Excerpt:
-key Cryptography Public Key Cryptography Key Agreement Protocols Key Management Digital Signatures Public Key
by
Hofacker, Charles F.
Inhaltsverzeichnis
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Table of contents http://catdir.loc.gov/catdir/toc/onix06/00036498.html
Table of contents http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Publisher description http://catdir.loc.gov/catdir/description/wiley035/00036498.html
Cover http://swbplus.bsz-bw.de/bsz08739104xcov.htm
Format:
Books
Publication Date
2001
Excerpt:
Cryptography -- Techniques Used by Crackers -- Defenses Used.
by
Schneier, Bruce, 1963-
Table of contents Kostenfrei
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Table of contents http://catdir.loc.gov/catdir/toc/onix04/00042252.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html
Publisher description http://catdir.loc.gov/catdir/description/wiley0310/00042252.html
Format:
Books
Publication Date
2000
Excerpt:
cryptographie.
by
Bauer, Friedrich L.
Format:
Books
Publication Date
2000
Excerpt:
Cryptography.
by
Grewlich, Klaus W.
Format:
Books
Publication Date
1999
Excerpt:
), development and culture, consumer protection, cryptography, domain names and copyright. Lawyers, regulators
by
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:
Books
Publication Date
1996
Excerpt:
cryptographie.
40.
by
Singhal, Mukesh.
Table of contents http://www.loc.gov/catdir/toc/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Publisher description http://www.loc.gov/catdir/description/mh022/93029812.html
Format:
Books
Publication Date
1994
Excerpt:
Protection: Access and Flow Control -- 15. Data Security: Cryptography -- 16. Multiprocessor System
by
Garfinkel, Simson.
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html
Format:
Books
Publication Date
1991
Excerpt:
cryptographie.
Limit Search Results