10 Results
0000000000IIE
Cover image for Introduction to cryptography with mathematical foundations and computer implementations
by 
Stanoyevitch, Alexander.
Format: 
Books
Publication Date 
2011
Excerpt: 
Introduction to cryptography with mathematical foundations and computer implementations /
Available: Copies:
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
COMPUTERS / Security / Cryptography.
Available: Copies:
Cover image for Android security : attacks and defenses
by 
Misra, Anmol.
Format: 
Books
Publication Date 
2013
Excerpt: 
Information -- 7.6.5.Cryptography -- 7.6.6.Conclusion -- 7.7.Summary --
Available: Copies:
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
-- 3.3.Public Key Cryptography / S.O. Smalø -- 3.4.RSA-Public Key Cryptography / S.O. Smalø -- 3.5.RSA-Public-Key-Cryptography
Available: Copies:
Cover image for Security+ guide to network security fundamentals
by 
Ciampa, Mark D.
Format: 
Books
Publication Date 
2012
Excerpt: 
fundamentals -- Authentication and account management -- Basic cryptography -- Advanced cryptography
Available: Copies:
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2012
Excerpt: 
tools -- Cryptography -- Physical security -- Implementing information security -- Security and
Available: Copies:
Cover image for Discrete mathematics with applications
by 
Epp, Susanna S.
Format: 
Books
Publication Date 
2011
Excerpt: 
, computability, automata, cryptography, and combinatorics, students discover that the ideas of discrete
Available: Copies:
by 
Whitman, Michael E., 1964-.
Format: 
Books
Publication Date 
2009
Excerpt: 
datasikkerhed data security risikostyring risk management kryptografi cryptography.
Available: Copies:
Cover image for Principles of information security
by 
Whitman, Michael E., 1964-
Format: 
Books
Publication Date 
2009
Excerpt: 
security tools -- 8. Cryptography -- 9. Physical security -- 10. Implementing information security -- 11
Available: Copies: