Showing 41 - 60 results of 61 for search '"cryptography"', query time: 0.02s Refine Results
  1. 41
    by Burnett, Steve
    Published 2001
    Referensi
  2. 42
    by Schneier, Bruce
    Published 1996
    Subjects: ...1. Computer securtiy. 2. Cryptography....
    TEXT
  3. 43
  4. 44
    by Singh, Simon
    Published 1999
    Subjects: ...1. Cryptography, history....
    TEXT
  5. 45
    by Singh, Simon
    Published 1999
    Subjects: ...1. Cryptography -- histori....
    TEXT
  6. 46
    by Galbreath, Nick
    Published 2002
    Subjects: ...CRYPTOGRAPHY-COMPUTER...
    Referensi
  7. 47
    by Galbreath, Nick
    Published 2002
    Subjects: ...CRYPTOGRAPHY-COMPUTER...
    Referensi
  8. 48
    by Dwianandiyana, Yudi B.
    Published 2006
    Subjects: ...CRYPTOGRAPHY-COMPUTER...
    Referensi
  9. 49
  10. 50
    by John E. Hershey
    Published
    Subjects: ...Product Description: Addresses the difficult and essential foundations of cryptography in a way...
    TEXT
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56
    by Behrouz A. Forouzan
    Published
    Subjects: ...Synopsis: Cryptography and Network Security 1 Introduction Part 1 Symmetric-Key Encipherment 2...
    TEXT
  17. 57
    by William Stallinngs
    Published
    Subjects: ...Synopsis: 1. Introduction.I. CRYPTOGRAPHY. 2. Symmetric Encryption and Message Confidentiality. 3...
    TEXT
  18. 58
    by Seth T. Ross
    Published
    Subjects: ... integrity, Cryptography, Backups, auditing/logging, testing your defenses, security network services...
    TEXT
  19. 59
    by Gert De Laet
    Published
    Subjects: ... security vulnerabilities and the defenses used to protect network resources * Learn about cryptography...
    TEXT
  20. 60
    by Wm. Arthur Conklin
    Published
    Subjects: .../ Organizational Security 4 The Role of People in Security 5 Cryptography 6 Public Key Infrastructure 7 Standards...
    TEXT