Cryptography's role in securing the information society
I tiakina i:
Kaituhi rangatōpū: | ebrary, Inc |
---|---|
Ētahi atu kaituhi: | Dam, Kenneth W., Lin, Herbert |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Washington, DC :
National Academy Press,
1996.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Quantum communication and security
I whakaputaina: (2007)
I whakaputaina: (2007)
Secure communicating systems design, analysis, and implementation /
mā: Huth, Michael, 1962-
I whakaputaina: (2001)
mā: Huth, Michael, 1962-
I whakaputaina: (2001)
Contemporary cryptography
mā: Oppliger, Rolf
I whakaputaina: (2005)
mā: Oppliger, Rolf
I whakaputaina: (2005)
Disaster recovery planning for communications and critical infrastructure
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009)
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009)
Basics of contemporary cryptography for IT practitioners
mā: Ryabko, Boris
I whakaputaina: (2005)
mā: Ryabko, Boris
I whakaputaina: (2005)
Convergence : illicit networks and national security in the age of globalization /
I whakaputaina: (2013)
I whakaputaina: (2013)
Surveillance or security? the risks posed by new wiretapping technologies /
mā: Landau, Susan Eva
I whakaputaina: (2010)
mā: Landau, Susan Eva
I whakaputaina: (2010)
Online information review.
I whakaputaina: (2007)
I whakaputaina: (2007)
Contemporary cryptography /
mā: Oppliger, Rolf
I whakaputaina: (2011)
mā: Oppliger, Rolf
I whakaputaina: (2011)
Security and privacy in mobile and wireless networking /
I whakaputaina: (2009)
I whakaputaina: (2009)
Cryptography for developers
mā: St. Denis, Tom
I whakaputaina: (2007)
mā: St. Denis, Tom
I whakaputaina: (2007)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
mā: Omollo, Richard Otieno, me ētahi atu.
I whakaputaina: (2025)
mā: Omollo, Richard Otieno, me ētahi atu.
I whakaputaina: (2025)
Coding and cryptography : synergy for a robust communication /
mā: Živić, Nataša
I whakaputaina: (2013)
mā: Živić, Nataša
I whakaputaina: (2013)
User's guide to cryptography and standards
mā: Dent, Alexander W.
I whakaputaina: (2005)
mā: Dent, Alexander W.
I whakaputaina: (2005)
Cryptography protocols, design and applications /
I whakaputaina: (2012)
I whakaputaina: (2012)
Quantum cryptography potentially perfect security.
I whakaputaina: (2003)
I whakaputaina: (2003)
IBM eserver zSeries 990 (z990) cryptography implementation
I whakaputaina: (2004)
I whakaputaina: (2004)
Electricity requirements for a digital society
mā: Baer, Walter S.
I whakaputaina: (2002)
mā: Baer, Walter S.
I whakaputaina: (2002)
An introduction to mathematical cryptography
mā: Hoffstein, Jeffrey
I whakaputaina: (2008)
mā: Hoffstein, Jeffrey
I whakaputaina: (2008)
Introduction to communication systems simulation
mā: Schiff, Maurice, 1942-
I whakaputaina: (2006)
mā: Schiff, Maurice, 1942-
I whakaputaina: (2006)
Security secrets, intruders and ID tags.
I whakaputaina: (2003)
I whakaputaina: (2003)
PGP & GPG email for the practical paranoid /
mā: Lucas, Michael, 1967-
I whakaputaina: (2006)
mā: Lucas, Michael, 1967-
I whakaputaina: (2006)
Telecommunications and the computer.
mā: Martin, James, 1933-
I whakaputaina: (1969)
mā: Martin, James, 1933-
I whakaputaina: (1969)
Secure multi-party computation
I whakaputaina: (2013)
I whakaputaina: (2013)
Identity-based cryptography
I whakaputaina: (2009)
I whakaputaina: (2009)
Network nation inventing American telecommunications /
mā: John, Richard R., 1959-
I whakaputaina: (2010)
mā: John, Richard R., 1959-
I whakaputaina: (2010)
New telecom networks : enterprises and security /
mā: Battu, Daniel
I whakaputaina: (2014)
mā: Battu, Daniel
I whakaputaina: (2014)
Coded modulation systems
mā: Anderson, John B., 1945-
I whakaputaina: (2003)
mā: Anderson, John B., 1945-
I whakaputaina: (2003)
zSeries Trusted Key Entry (TKE) version 4.2 update
mā: Kappeler, Patrick
I whakaputaina: (2004)
mā: Kappeler, Patrick
I whakaputaina: (2004)
Boolean functions in cryptology and information security
I whakaputaina: (2008)
I whakaputaina: (2008)
Renewing U.S. telecommunications research
I whakaputaina: (2006)
I whakaputaina: (2006)
Reconstruction of chaotic signals with applications to chaos-based communications
mā: Feng, Jiu Chao
I whakaputaina: (2008)
mā: Feng, Jiu Chao
I whakaputaina: (2008)
RabbitMQ essentials : hop straight into developing your own messaging applications by learning how to utilize RabbitMQ /
mā: Dossot, David
I whakaputaina: (2014)
mā: Dossot, David
I whakaputaina: (2014)
Behavioral modelling and predistortion of wideband wireless transmitters /
mā: Ghannouchi, Fadhel M., 1958-, me ētahi atu.
I whakaputaina: (2015)
mā: Ghannouchi, Fadhel M., 1958-, me ētahi atu.
I whakaputaina: (2015)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
mā: Chandra, Praphul
I whakaputaina: (2005)
mā: Chandra, Praphul
I whakaputaina: (2005)
Cryptography and network security : principles and practice /
mā: Stallings, William
I whakaputaina: (2006)
mā: Stallings, William
I whakaputaina: (2006)
The facts on file dictionary of telecommunications /
mā: Graham, John
I whakaputaina: (1991)
mā: Graham, John
I whakaputaina: (1991)
The facts on file dictionary of telecomunications /
mā: Graham, John
I whakaputaina: (1991)
mā: Graham, John
I whakaputaina: (1991)
Practical radio resource management in wireless systems
mā: Kyriazakos, Sofoklis A., 1975-
I whakaputaina: (2004)
mā: Kyriazakos, Sofoklis A., 1975-
I whakaputaina: (2004)
Practical VoIP Security
mā: Porter, Thomas
I whakaputaina: (2006)
mā: Porter, Thomas
I whakaputaina: (2006)
Ngā tūemi rite
-
Quantum communication and security
I whakaputaina: (2007) -
Secure communicating systems design, analysis, and implementation /
mā: Huth, Michael, 1962-
I whakaputaina: (2001) -
Contemporary cryptography
mā: Oppliger, Rolf
I whakaputaina: (2005) -
Disaster recovery planning for communications and critical infrastructure
mā: Wrobel, Leo A. (Leo Anthony)
I whakaputaina: (2009) -
Basics of contemporary cryptography for IT practitioners
mā: Ryabko, Boris
I whakaputaina: (2005)