Modern cryptography theory and practice
Saved in:
| Main Author: | Mao, Wenbo |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Upper Saddle River, NJ
Prentice Hall PTR
2004
|
| Series: | Hewlett-Packard professional books
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
Information security--the next decade : proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95
Published: (1995)
Published: (1995)
Cryptography and security services mechanisms and applications
by: Mogollon, Manuel
Published: (2007)
by: Mogollon, Manuel
Published: (2007)
Cryptography theory and practice
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
by: Stinson, Douglas R. (Douglas Robert) 1956-
Published: (2006)
Cryptography theory and practice
by: Stinson lhDouglas R.
by: Stinson lhDouglas R.
Cryptography a very short introduction
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
by: Piper, F. C. (Frederick Charles) 1940-, et al.
Published: (2002)
Cryptography demystified
by: Hershey
Published: (2003)
by: Hershey
Published: (2003)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Contemporary cryptology the science of information integrity
Published: (1992)
Published: (1992)
Identity-based cryptography
Published: (2009)
Published: (2009)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2010)
by: Hoffstein, Jeffrey, et al.
Published: (2010)
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996)
by: Schneier
Published: (1996)
An introduction to cryptography
by: Mollin, Richard A. 1947-
Published: (2000)
by: Mollin, Richard A. 1947-
Published: (2000)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Digital identity management
Published: (2015)
Published: (2015)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
Foundations of cryptography
by: Goldreich, Oded
Published: (2003)
by: Goldreich, Oded
Published: (2003)
Client - side attacks and defense
by: Shimonski, Robert
Published: (2012)
by: Shimonski, Robert
Published: (2012)
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2014)
by: Hoffstein, Jeffrey, et al.
Published: (2014)
Introduction to cryptography
by: Padhye, Sahadeo, et al.
Published: (2018)
by: Padhye, Sahadeo, et al.
Published: (2018)
Similar Items
-
Introduction to cryptography principles and applications
by: Delfs
Published: (2007) -
Computer security and cryptography
by: Konheim 1934-
Published: (2007) -
Cryptography protocols, design, and applications
Published: (2012) -
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008) -
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)


