Search Results for Cryptography.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dCryptography.$0026dt$003dlist$0026ps$003d300?2025-06-13T21:29:31ZComplexity and cryptography : an introductionent://SD_ILS/0/SD_ILS:318652025-06-13T21:29:31Z2025-06-13T21:29:31Zby Talbot, John.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0659/2006296276-d.html">http://www.loc.gov/catdir/enhancements/fy0659/2006296276-d.html</a>
Table of contents <a href="http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html">http://www.loc.gov/catdir/enhancements/fy0659/2006296276-t.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:315452025-06-13T21:29:31Z2025-06-13T21:29:31Zby Stallings, William.<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0608/2006276085.html">http://www.loc.gov/catdir/toc/fy0608/2006276085.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papersent://SD_ILS/0/SD_ILS:338312025-06-13T21:29:31Z2025-06-13T21:29:31Zby International Workshop on Coding and Cryptography (2005 : Bergen, Norway)<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/fy0706/2006927431.html">http://www.loc.gov/catdir/toc/fy0706/2006927431.html</a><br/>Format: Books<br/>Publication Date 2006<br/>Introduction to cryptography with mathematical foundations and computer implementationsent://SD_ILS/0/SD_ILS:430762025-06-13T21:29:31Z2025-06-13T21:29:31Zby Stanoyevitch, Alexander.<br/>Format: Books<br/>Publication Date 2011<br/>Cryptography and e-commerce : a Wiley tech briefent://SD_ILS/0/SD_ILS:242862025-06-13T21:29:31Z2025-06-13T21:29:31Zby Graff, Jon.<br/>Format: Books<br/>Publication Date 2001<br/>Principles of information securityent://SD_ILS/0/SD_ILS:571062025-06-13T21:29:31Z2025-06-13T21:29:31Zby Whitman, Michael E., 1964- author.<br/>Format: Books<br/>Publication Date 2022<br/>Essential algorithms : a practical approach to computer algorithms using Python and C#ent://SD_ILS/0/SD_ILS:555232025-06-13T21:29:31Z2025-06-13T21:29:31Zby Stephens, Rod, 1961- author.<br/>Format: Books<br/>Publication Date 2019<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3472025-06-13T21:29:31Z2025-06-13T21:29:31Zby Ciampa, Mark D., author.<br/>Format: Books<br/>Publication Date 2015<br/>Security in computingent://SD_ILS/0/SD_ILS:557882025-06-13T21:29:31Z2025-06-13T21:29:31Zby Pfleeger, Charles P., 1948- author.<br/><a href="http://catalogue.londonmet.ac.uk/record=b1680851~S1">E-book</a><br/>Format: Regular print<br/>Publication Date 2015<br/>Android programming : pushing the limitsent://SD_ILS/0/SD_ILS:95712025-06-13T21:29:31Z2025-06-13T21:29:31Zby Hellman, Erik, 1977-<br/>Format: Books<br/>Publication Date 2014<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:565002025-06-13T21:29:31Z2025-06-13T21:29:31Zby Andress, Jason.<br/>EBSCO <a href="https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site">https://ezproxy.iielearn.ac.za/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=786214&site=ehost-live&scope=site</a><br/>Format: Books<br/>Publication Date 2014<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:502232025-06-13T21:29:31Z2025-06-13T21:29:31Zby Jacobson, Douglas.<br/>Format: Books<br/>Publication Date 2013<br/>Android security : attacks and defensesent://SD_ILS/0/SD_ILS:502242025-06-13T21:29:31Z2025-06-13T21:29:31Zby Misra, Anmol.<br/>Format: Books<br/>Publication Date 2013<br/>Advanced DPA theory and practice : towards the security limits of secure embedded circuitsent://SD_ILS/0/SD_ILS:537912025-06-13T21:29:31Z2025-06-13T21:29:31Zby Peeters, Eric, author.<br/>Table of contents <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-t.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html">http://catdir.loc.gov/catdir/enhancements/fy1501/2013933300-d.html</a><br/>Format: Books<br/>Publication Date 2013<br/>Security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:19692025-06-13T21:29:31Z2025-06-13T21:29:31Zby Ciampa, Mark D.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html</a>
Table of contents only <a href="http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html">http://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html</a><br/>Format: Books<br/>Publication Date 2012<br/>Principles of information securityent://SD_ILS/0/SD_ILS:164132025-06-13T21:29:31Z2025-06-13T21:29:31Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-06-13T21:29:31Z2025-06-13T21:29:31Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Discrete mathematics with applicationsent://SD_ILS/0/SD_ILS:178402025-06-13T21:29:31Z2025-06-13T21:29:31Zby Epp, Susanna S.<br/>Format: Books<br/>Publication Date 2011<br/>Principles of information securityent://SD_ILS/0/SD_ILS:432472025-06-13T21:29:31Z2025-06-13T21:29:31Zby Whitman, Michael E., 1964-<br/>Format: Books<br/>Publication Date 2009<br/>Principles of information securityent://SD_ILS/0/SD_ILS:408092025-06-13T21:29:31Z2025-06-13T21:29:31Zby Whitman, Michael E., 1964-.<br/>Format: Books<br/>Publication Date 2009<br/>Security in computingent://SD_ILS/0/SD_ILS:343292025-06-13T21:29:31Z2025-06-13T21:29:31Zby Pfleeger, Charles P., 1948-<br/>Table of contents only <a href="http://www.loc.gov/catdir/toc/ecip0619/2006026798.html">http://www.loc.gov/catdir/toc/ecip0619/2006026798.html</a><br/>Format: Books<br/>Publication Date 2007<br/>The unofficial guide to ethical hackingent://SD_ILS/0/SD_ILS:90172025-06-13T21:29:31Z2025-06-13T21:29:31Zby Fadia, Ankit, 1985-<br/>Format: Books<br/>Publication Date 2006<br/>Colossus : Bletchley Park's greatest secretent://SD_ILS/0/SD_ILS:313792025-06-13T21:29:31Z2025-06-13T21:29:31Zby Gannon, Paul.<br/>Format: Books<br/>Publication Date 2006<br/>Colossus : the secrets of Bletchley Park's codebreaking computersent://SD_ILS/0/SD_ILS:313802025-06-13T21:29:31Z2025-06-13T21:29:31Zby Copeland, B. Jack, 1950-<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/ecip062/2005030993.html">http://www.loc.gov/catdir/toc/ecip062/2005030993.html</a>
Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html">http://www.loc.gov/catdir/enhancements/fy0636/2005030993-d.html</a><br/>Format: Books<br/>Publication Date 2006<br/>A man of intelligence : the life of Captain Eric Nave, codebreaker extraordinaryent://SD_ILS/0/SD_ILS:313972025-06-13T21:29:31Z2025-06-13T21:29:31Zby Pfennigwerth, Ian.<br/>Format: Books<br/>Publication Date 2006<br/>Linux network securityent://SD_ILS/0/SD_ILS:5742025-06-13T21:29:31Z2025-06-13T21:29:31Zby Smith, Peter G., 1977-<br/>Table of contents <a href="http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html">http://catdir.loc.gov/catdir/toc/ecip056/2005000312.html</a><br/>Format: Electronic Resources<br/>Publication Date 2005<br/>From calculus to computers : using the last 200 years of mathematics history in the classrooment://SD_ILS/0/SD_ILS:318582025-06-13T21:29:31Z2025-06-13T21:29:31Zby Shell-Gellasch, Amy.<br/>Publisher description <a href="http://www.loc.gov/catdir/enhancements/fy0659/2005908422-d.html">http://www.loc.gov/catdir/enhancements/fy0659/2005908422-d.html</a>
Table of contents <a href="http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html">http://www.loc.gov/catdir/enhancements/fy0659/2005908422-t.html</a><br/>Format: Books<br/>Publication Date 2005<br/>Cyberlaw @ SA II : the law of the Internet in South Africaent://SD_ILS/0/SD_ILS:215282025-06-13T21:29:31Z2025-06-13T21:29:31Zby Buys, Reinhardt.<br/>Format: Books<br/>Publication Date 2004<br/>Computer networksent://SD_ILS/0/SD_ILS:121532025-06-13T21:29:31Z2025-06-13T21:29:31Zby Tanenbaum, Andrew S., 1944-<br/>Safari Books Online <a href="http://proquest.safaribooksonline.com/0130661023">http://proquest.safaribooksonline.com/0130661023</a><br/>Format: Books<br/>Publication Date 2003<br/>Security in computingent://SD_ILS/0/SD_ILS:279812025-06-13T21:29:31Z2025-06-13T21:29:31Zby Pfleeger, Charles P., 1948-<br/>Format: Books<br/>Publication Date 2003<br/>Network security essentials : applications and standardsent://SD_ILS/0/SD_ILS:200802025-06-13T21:29:31Z2025-06-13T21:29:31Zby Stallings, William.<br/>Format: Books<br/>Publication Date 2003<br/>Network perimeter security : building defense in-depthent://SD_ILS/0/SD_ILS:277982025-06-13T21:29:31Z2025-06-13T21:29:31Zby Riggs, Cliff.<br/>Format: Books<br/>Publication Date 2003<br/>Algorithm design : foundations, analysis, and Internet examplesent://SD_ILS/0/SD_ILS:478272025-06-13T21:29:31Z2025-06-13T21:29:31Zby Goodrich, Michael T.<br/>Format: Books<br/>Publication Date 2002<br/>E-business & e-commerce : how to programent://SD_ILS/0/SD_ILS:127282025-06-13T21:29:31Z2025-06-13T21:29:31Zby Deitel, Harvey M., 1945-<br/>Format: Books<br/>Publication Date 2001<br/>Internet marketingent://SD_ILS/0/SD_ILS:135692025-06-13T21:29:31Z2025-06-13T21:29:31Zby Hofacker, Charles F.<br/><a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">Inhaltsverzeichnis</a>
Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix06/00036498.html">http://catdir.loc.gov/catdir/toc/onix06/00036498.html</a>
Table of contents <a href="http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=009264113&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley035/00036498.html">http://catdir.loc.gov/catdir/description/wiley035/00036498.html</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz08739104xcov.htm">http://swbplus.bsz-bw.de/bsz08739104xcov.htm</a><br/>Format: Books<br/>Publication Date 2001<br/>Decrypted secrets : methods and maxims of cryptologyent://SD_ILS/0/SD_ILS:239242025-06-13T21:29:31Z2025-06-13T21:29:31Zby Bauer, Friedrich L.<br/>Format: Books<br/>Publication Date 2000<br/>Secrets and lies : digital security in a networked worldent://SD_ILS/0/SD_ILS:141712025-06-13T21:29:31Z2025-06-13T21:29:31Zby Schneier, Bruce, 1963-<br/>Table of contents <a href="http://www.gbv.de/dms/ilmenau/toc/314774726.PDF">Kostenfrei</a>
Table of contents <a href="http://catdir.loc.gov/catdir/toc/onix04/00042252.html">http://catdir.loc.gov/catdir/toc/onix04/00042252.html</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html">http://catdir.loc.gov/catdir/enhancements/fy0705/00042252-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/description/wiley0310/00042252.html">http://catdir.loc.gov/catdir/description/wiley0310/00042252.html</a><br/>Format: Books<br/>Publication Date 2000<br/>Governance in "cyberspace" : access and public interest in global communicationsent://SD_ILS/0/SD_ILS:251112025-06-13T21:29:31Z2025-06-13T21:29:31Zby Grewlich, Klaus W.<br/>Format: Books<br/>Publication Date 1999<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:143192025-06-13T21:29:31Z2025-06-13T21:29:31Zby Garfinkel, Simson.<br/>Table of contents <a href="http://www.gbv.de/dms/bowker/toc/9781565921481.pdf">http://www.gbv.de/dms/bowker/toc/9781565921481.pdf</a>
Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html">http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html</a>
Umschlagbild <a href="http://swbplus.bsz-bw.de/bsz048310409cov.htm">http://swbplus.bsz-bw.de/bsz048310409cov.htm</a><br/>Format: Books<br/>Publication Date 1996<br/>Advanced concepts in operating systems : distributed, database, and multiprocessor operating systemsent://SD_ILS/0/SD_ILS:261012025-06-13T21:29:31Z2025-06-13T21:29:31Zby Singhal, Mukesh.<br/>Table of contents <a href="http://www.loc.gov/catdir/toc/mh022/93029812.html">http://www.loc.gov/catdir/toc/mh022/93029812.html</a>
Publisher description <a href="http://www.loc.gov/catdir/description/mh022/93029812.html">http://www.loc.gov/catdir/description/mh022/93029812.html</a><br/>Format: Books<br/>Publication Date 1994<br/>Practical UNIX security : computer securityent://SD_ILS/0/SD_ILS:155902025-06-13T21:29:31Z2025-06-13T21:29:31Zby Garfinkel, Simson.<br/>Contributor biographical information <a href="http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html">http://catdir.loc.gov/catdir/enhancements/fy0912/92195509-b.html</a>
Publisher description <a href="http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html">http://catdir.loc.gov/catdir/enhancements/fy0715/92195509-d.html</a><br/>Format: Books<br/>Publication Date 1991<br/>