Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography
- Computer security 26
- Data encryption (Computer science) 13
- Coding theory 10
- World War, 1939-1945 10
- Ciphers 8
- Security measures 8
- History 6
- Internet 6
- Mathematics 6
- Computers 4
- Cryptographers 4
- Electronic intelligence 4
- Participation, Indian 4
- Quantum communication 4
- Quantum theory 4
- Aboriginal Australians 2
- Access control 2
- Algebra, Boolean 2
- American literature 2
- Armed Forces 2
- Chiffres (Cryptographie) dans la litterature 2
- Ciphers in literature 2
- Cold War 2
- Comanche Indians 2
- Communism 2
- Computer networks 2
- Computer science 2
- Computer software 2
- Cryptographie 2
-
1
-
2
Quantum cryptography potentially perfect security.
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Cryptography's role in securing the information society
Published 1996An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Security secrets, intruders and ID tags.
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Nanomechanics and nanoelectronics molecule-size machines /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
User's guide to cryptography and standards
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Intelligent watermarking techniques
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Contemporary cryptography
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
zSeries Trusted Key Entry (TKE) version 4.2 update
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
zSeries crypto guide update
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
IBM eserver zSeries 990 (z990) cryptography implementation
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Cryptography for developers
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
-
14
Basics of contemporary cryptography for IT practitioners
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
-
16
-
17
Quantum communication and security
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
18
Venona decoding Soviet espionage in America /
Published 1999An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Online information review.
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
The Comanche code talkers of World War II
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook