Loading...
Error: Cannot Load Popup Box
Your Account
|
Log Out
Login
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Cryptography
Computer security
(5)
Ciphers
(4)
Access control
(2)
Computers --
(2)
Security measures
(2)
more ...
Additional Suggested Topics
... within your search.
C (Computer program language)
(1)
Coding theory
(1)
Copyright and electronic data processing --
(1)
Data encryption (Computer science)
(1)
Data protection
(1)
Machine ciphers
(1)
Mathematics
(1)
Software engineering
(1)
Telecommunication --
(1)
Telecommunication systems --
(1)
Wireless communication systems
(1)
less ...
Showing
1
-
12
of
12
for search:
''
, query time: 0.02s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Cryptographic security architecture : design and verification /
by
Gutmann, Peter
Published 2004
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptology yesterday, to day, and tomorrow /
by
Deavours, Cipher A.
Published 1987
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptology : machines, history and methods /
by
Deavours, Cipher
Published 1989
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryjptography theory and practice /
by
Stinson, Douglas R.
Published 1995
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Wiley survival guide in global telecommunications : broadband access, optical components and networks, and cryptography /
by
Desurvire, Emmanuel
Published 2004
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
ICSA guide to cryptography /
by
Nichols, Randall K.
Published 1999
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptography : an introduction to computer security /
by
Seberry, Jennifer
Published 1989
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Surreptitious software : obfuscation, watermarking, and tamperproofing for softwae protection /
by
Collberg, Christian
Published 2010
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
The Usborne book of secret codes /
by
O'Brien, Eileen
Published 1998
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Machine cryptography and modern cryptanalysis /
by
Deavours, Cipher A.
Published 1985
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptography and secure communications /
by
Rhee, Man Young
Published 1994
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Applied cryptography : protocols, algorithms, and source code in C /
by
Schneier, Bruce
Published 1996
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Cryptography
Institution
MUT
(12)
Library
mut
(12)
Format
MONOGRAPHS
(12)
Call Number
Q - Science
(7)
Z - Library Science
(4)
T - Technology
(1)
Author
Deavours, Cipher A.
(2)
Collberg, Christian
(1)
Deavours, Cipher
(1)
Desurvire, Emmanuel
(1)
Gutmann, Peter
(1)
more ...
Nichols, Randall K.
(1)
O'Brien, Eileen
(1)
Rhee, Man Young
(1)
Schneier, Bruce
(1)
Seberry, Jennifer
(1)
Stinson, Douglas R.
(1)
less ...
Language
English
(12)
Region
United States
(1)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs