-
41
-
42
-
43
-
44
-
45
-
46
-
47
-
48
-
49
-
50by John E. HersheySubjects: “...Product Description: Addresses the difficult and essential foundations of cryptography in a way...”
Published
TEXT -
51
-
52
-
53
-
54
-
55
-
56by Behrouz A. ForouzanSubjects: “...Synopsis: Cryptography and Network Security 1 Introduction Part 1 Symmetric-Key Encipherment 2...”
Published
TEXT -
57by William StallinngsSubjects: “...Synopsis: 1. Introduction.I. CRYPTOGRAPHY. 2. Symmetric Encryption and Message Confidentiality. 3...”
Published
TEXT -
58by Seth T. RossSubjects: “... integrity, Cryptography, Backups, auditing/logging, testing your defenses, security network services...”
Published
TEXT -
59by Gert De LaetSubjects: “... security vulnerabilities and the defenses used to protect network resources * Learn about cryptography...”
Published
TEXT -
60by Wm. Arthur ConklinSubjects: “.../ Organizational Security 4 The Role of People in Security 5 Cryptography 6 Public Key Infrastructure 7 Standards...”
Published
TEXT