Showing 1 - 20 results of 177 for search '"Computer security"', query time: 5.14s Refine Results
  1. 1

    Crypto / by Levy, Steven, Safari Books Online

    Published: Tantor Media, Inc., 2021
    Subjects: “…Computer security.…”
    Get full text
    Online Audio (Non-Music)
  2. 2

    Real-world cryptography / by Wong, David (Cryptography engineer), Safari Books Online

    Published: Manning Publications Co., 2021
    Subjects: “…Computer security.…”
    Get full text
    Online Audio (Non-Music)
  3. 3

    Beginning cryptography with Java by Hook, David, 1962-, Books24x7, Inc

    Published: Wiley Pub., 2005
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  4. 4

    Beginning cryptography with Java / by Hook, David, 1962-

    Published: Wrox/Wiley Pub., 2005
    Subjects: “…Computer security.…”
    Book
  5. 5
  6. 6

    Crypto : how the code rebels beat the government--saving privacy in the digital age / by Levy, Steven

    Published: Viking, 2001
    Subjects: “…Computer security.…”
    Book
  7. 7

    Decrypted secrets : methods and maxims of cryptology / by Bauer, Friedrich Ludwig, 1924-

    Published: Springer, 2002
    Subjects: “…Computer security.…”
    Book
  8. 8

    Cryptographic security architecture : design and verification / by Gutmann, Peter

    Published: Springer, 2004
    Subjects: “…Computer security.…”
    Book
  9. 9

    A classical introduction to cryptography applications for communications security / by Vaudenay, Serge, Books24x7, Inc

    Published: Springer, 2006
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  10. 10

    Chaos-based cryptography theory, algorithms and applications / by SpringerLink (Online service)

    Published: Springer, 2011
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  11. 11

    Basics of contemporary cryptography for IT practitioners by Ryabko, Boris, ProQuest Ebook Subscriptions, ProQuest (Firm)

    Published: World Scientific, 2005
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  12. 12
  13. 13
  14. 14
  15. 15

    Decrypted secrets : methods and maxims of cryptology / by Bauer, Friedrich Ludwig, 1924-

    Published: Springer, 2000
    Subjects: “…Computer security.…”
    Book
  16. 16
  17. 17

    Electromagnetic information leakage and countermeasure technique / by Liu, Taikang, Li, Yongmei, SpringerLink (Online service)

    Published: Springer, 2019
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  18. 18

    Data-driven block ciphers for fast telecommunication systems by Moldovyan, Nick, Moldovyan, Alex, Books24x7, Inc

    Published: Auerbach Publications, 2008
    Subjects: “…Computer security.…”
    Get full text
    Online Book
  19. 19

    Secure multi-party computation by ProQuest Ebook Subscriptions, ProQuest (Firm)

    Published: IOS Press, 2013
    Subjects: “…Computer security Management.…”
    Get full text
    Online Book
  20. 20

    Real-world cryptography / by Safari Books Online

    Published: Manning Publications, 2021
    Subjects: “…Computer security.…”
    Get full text
    Get full text
    Online Video Online Video