Contemporary cryptology the science of information integrity
The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function tha...
Saved in:
| Other Authors: | Simmons, Gustavus J. |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York, NY
IEEE Press
1992
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996)
by: Schneier
Published: (1996)
International journal of cryptology research
Published: (2009)
Published: (2009)
Classical and contemporary cryptology
by: Spillman lhRichard J
by: Spillman lhRichard J
Encyclopedia of cryptology
by: Newton
Published: (1997)
by: Newton
Published: (1997)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Introduction to cryptography principles and applications
by: Delfs
Published: (2007)
by: Delfs
Published: (2007)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Integer algorithms in cryptology and information assurance
by: Verkhovsky, Boris S.
Published: (2015)
by: Verkhovsky, Boris S.
Published: (2015)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Computer and information security
Published: (2016)
Published: (2016)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Software test attacks to break mobile and embedded devices
by: Hagar, Jon Duncan
Published: (2017)
by: Hagar, Jon Duncan
Published: (2017)
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015)
by: Dykstra, Josiah
Published: (2015)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Managing information security
Published: (2014)
Published: (2014)
Big book of IPsec RFCs Internet security architecture
by: Loshin
Published: (2000)
by: Loshin
Published: (2000)
Information protection playbook
Published: (2013)
Published: (2013)
Principles of information systems security text and cases
by: Dhillon, Gurpreet 1963-
Published: (2017)
by: Dhillon, Gurpreet 1963-
Published: (2017)
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Hardening network infrastructure
by: Noonan, Wesley J.
Published: (2004)
by: Noonan, Wesley J.
Published: (2004)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Protecting your PC
by: Barile, Ian
Published: (2006)
by: Barile, Ian
Published: (2006)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Spillage of information threats to Malaysia security
by: Mohd. Zaily Hatta Mohd. Jelani
by: Mohd. Zaily Hatta Mohd. Jelani
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Hands-on cybersecurity for architects plan and design robust security architectures
by: Rerup, Neil, et al.
Published: (2018)
by: Rerup, Neil, et al.
Published: (2018)
Similar Items
-
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005) -
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015) -
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996) -
International journal of cryptology research
Published: (2009) -
Classical and contemporary cryptology
by: Spillman lhRichard J


