Cryptology unlocked
| Main Authors: | Wobst, Reinhard (Author), Shafir, Angelika (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Chichester ; Hoboken, NJ
John Wiley & Sons
c2007
|
| Subjects: | |
| Online Access: | Table of contents only |
Similar Items
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Computer security
Published: (1986)
Published: (1986)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Cyrptography in constant parallel time
by: Applebaum, Benny
Published: (2014)
by: Applebaum, Benny
Published: (2014)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003)
by: Bishop, David
Published: (2003)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
Computer viruses and data protection
Published: (1991)
Published: (1991)
Practical information security management a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
Information security management concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos
by: Mohd Asyraf Muizzuddin Yunos
نظرية التشفير والتعمية الاساسيات
by: Hankerson, Darrel R.
Published: (2014)
by: Hankerson, Darrel R.
Published: (2014)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963-
Published: (2015)
by: Schneier, Bruce 1963-
Published: (2015)
Security in computing
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
Information hiding 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 revised selected papers
by: Camenisch, Jan
Published: (2007)
by: Camenisch, Jan
Published: (2007)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Similar Items
-
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004) -
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013) -
Access control and identity management
by: Chapple, Mike
Published: (2021) -
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007) -
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)