7A Security's official guide cryptography
Saved in:
| Main Author: | Burnett |
|---|---|
| Other Authors: | Paine |
| Format: | Book |
| Published: |
New York
McGraw-Hill
2001
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
Identity-based cryptography
Published: (2009)
Published: (2009)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Cryptography and network security principles and practices
by: Stallings
Published: (2006)
by: Stallings
Published: (2006)
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Cryptography for security and privacy in cloud computing
by: Rass, Stefan, et al.
Published: (2014)
by: Rass, Stefan, et al.
Published: (2014)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Cryptography and security services mechanisms and applications
by: Mogollon, Manuel
Published: (2007)
by: Mogollon, Manuel
Published: (2007)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide /
by: Chapple, Mike, et al.
Published: (2024)
by: Chapple, Mike, et al.
Published: (2024)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Citizen-centric privacy requirements engineering framework
by: Nor Asiakin Hasbullah
Published: (2017)
by: Nor Asiakin Hasbullah
Published: (2017)
Cryptography, automata and learning theory
Published: (2011)
Published: (2011)
CCNA security official exam certification guide
by: Watkins, Michael
Published: (2008)
by: Watkins, Michael
Published: (2008)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
Security + guide to network security fundamentals
by: Campbell
Published: (2003)
by: Campbell
Published: (2003)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Security and privacy in social networks
Published: (2013)
Published: (2013)
Satellite encryption
by: Vacca
Published: (1999)
by: Vacca
Published: (1999)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Similar Items
-
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013) -
Cryptography and network security principles and practices
by: Stallings
Published: (2003) -
Cryptography and network security principles and practice
by: Stallings
Published: (1998) -
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023) -
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)


