Cryptography Infosec pro guide
| Main Author: | Oriyano, Sean-Philip (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York
McGraw-Hill Education
c2013
|
| Series: | Infosec pro guide
|
| Subjects: |
Similar Items
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
by: Jeyanthi, P. Abisha, et al.
Published: (2011)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Implementing ssl/tls using cryptography and pki
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
by: Davies, Joshua A. [ (Joshua Aaron)]
Published: (2011)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
by: Kevenaar, Thomas Andreas Mari , 1961-, et al.
Published: (2007)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography with Java applets
by: Bishop, David
Published: (2003)
by: Bishop, David
Published: (2003)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Cyrptography in constant parallel time
by: Applebaum, Benny
Published: (2014)
by: Applebaum, Benny
Published: (2014)
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)
by: Galbraith, Steven D.
Published: (2007)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963-
Published: (2015)
by: Schneier, Bruce 1963-
Published: (2015)
Visual cryptography and secret image sharing
by: Ching-Nung, Yang, et al.
Published: (2012)
by: Ching-Nung, Yang, et al.
Published: (2012)
Handbook of financial cryptography and security
by: Rosenberg, Burton
Published: (2011)
by: Rosenberg, Burton
Published: (2011)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Electronic payment systems for E-commerce
by: O'Mahony, Donal , 1961-, et al.
Published: (2001)
by: O'Mahony, Donal , 1961-, et al.
Published: (2001)
An introduction to mathematical cryptography
by: Hoffstein, Jeffrey, et al.
Published: (2008)
by: Hoffstein, Jeffrey, et al.
Published: (2008)
Cryptographic protocol security analysis based on trusted freshness
by: Ling, Dong, et al.
Published: (2012)
by: Ling, Dong, et al.
Published: (2012)
Wiley survival guide in global telecommunications broadband access, optical components, and networks, and cryptography
by: Desurvire, Emmanuel 1955-
Published: (2004)
by: Desurvire, Emmanuel 1955-
Published: (2004)
Secure video transmission using steganography and cryptography
by: Maizatul Auni Mazhar
by: Maizatul Auni Mazhar
Noiseless steganography the key to covert communications
by: Desoky, Abdelrahman
Published: (2012)
by: Desoky, Abdelrahman
Published: (2012)
نظرية التشفير والتعمية الاساسيات
by: Hankerson, Darrel R.
Published: (2014)
by: Hankerson, Darrel R.
Published: (2014)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Ethical and social issues in the information age
by: Kizza, Joseph Migga
Published: (2013)
by: Kizza, Joseph Migga
Published: (2013)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Electronic signatures in law
by: Mason, Stephen
Published: (2012)
by: Mason, Stephen
Published: (2012)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
An enhanced authentication method based on user experience
by: Amirulihsan Mohamad
by: Amirulihsan Mohamad
Undang-undang siber Akta Tandatangan Digital 1997, Akta Jenayah Komputer 1997, Akta Teleperubatan 1997
Published: (1997)
Published: (1997)
Data structures with abstract data types and pascal
by: Stubbs, Daniel F., et al.
Published: (1985)
by: Stubbs, Daniel F., et al.
Published: (1985)
Similar Items
-
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016) -
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013) -
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007) -
Cryptography, automata and learning theory
by: Jeyanthi, P. Abisha, et al.
Published: (2011) -
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)