Ohcanbohtosat
Fáddáevttohusat
Fáddáevttohusat
- Cryptography
- Computer security 26
- Data encryption (Computer science) 13
- Coding theory 10
- World War, 1939-1945 10
- Ciphers 8
- Security measures 8
- History 6
- Internet 6
- Mathematics 6
- Computers 4
- Cryptographers 4
- Electronic intelligence 4
- Participation, Indian 4
- Quantum communication 4
- Quantum theory 4
- Aboriginal Australians 2
- Access control 2
- Algebra, Boolean 2
- American literature 2
- Armed Forces 2
- Chiffres (Cryptographie) dans la litterature 2
- Ciphers in literature 2
- Cold War 2
- Comanche Indians 2
- Communism 2
- Computer networks 2
- Computer science 2
- Computer software 2
- Cryptographie 2
-
1
Codes and ciphers Julius Caesar, the Enigma, and the internet /
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
2
Quantum cryptography potentially perfect security.
Almmustuhtton 2003An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
3
Cryptography's role in securing the information society
Almmustuhtton 1996An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
4
Security secrets, intruders and ID tags.
Almmustuhtton 2003An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
5
Nanomechanics and nanoelectronics molecule-size machines /
Almmustuhtton 2004An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
6
User's guide to cryptography and standards
Almmustuhtton 2005An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
7
Intelligent watermarking techniques
Almmustuhtton 2004An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
8
Contemporary cryptography
Almmustuhtton 2005An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
9
zSeries Trusted Key Entry (TKE) version 4.2 update
Almmustuhtton 2004An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
10
zSeries crypto guide update
Almmustuhtton 2003An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
11
IBM eserver zSeries 990 (z990) cryptography implementation
Almmustuhtton 2004An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
12
Cryptography for developers
Almmustuhtton 2007An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
13
The reader of gentlemen's mail Herbert O. Yardley and the birth of American codebreaking /
Almmustuhtton 2004An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
14
Basics of contemporary cryptography for IT practitioners
Almmustuhtton 2005An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
15
Colossus the secrets of Bletchley Park's codebreaking computers /
Almmustuhtton 2006An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
16
-
17
Quantum communication and security
Almmustuhtton 2007An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš Konfereansapublikašuvdna E-girji -
18
Venona decoding Soviet espionage in America /
Almmustuhtton 1999An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
19
Online information review.
Almmustuhtton 2007An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
20
The Comanche code talkers of World War II
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji