Loading...
Error: Cannot Load Popup Box
Your Account
|
Log Out
Login
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Data encryption (Computer science)
Computer networks --
(7)
Security measures
(7)
Computer security
(5)
Coding theory
(3)
Access control
(2)
more ...
Additional Suggested Topics
... within your search.
Computer science
(2)
Computers --
(2)
Data structures (Computer science)
(2)
Business enterprises --
(1)
Computer networks
(1)
Cryptography
(1)
Electronic commerce
(1)
Electronic funds transfers
(1)
Electronic funds transfers --
(1)
Electronic noise
(1)
Internet
(1)
Internet --
(1)
Mathematics
(1)
Multimedia systems
(1)
Privacy, Right of
(1)
Public key cryptography
(1)
Software engineering
(1)
Ubiquitous computing
(1)
World Wide Web --
(1)
less ...
Showing
1
-
10
of
10
for search:
''
, query time: 0.02s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting /
Published 2007
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
ICSA guide to cryptography /
by
Nichols, Randall K.
Published 1999
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Outsourcing information security /
by
Axelrod, C. Warren
Published 2004
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptography and network security : principles and practice /
by
Stallings, William
Published 2006
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptography and network security : principles and practice /
by
Stallings, William
Published 1999
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Security and privacy in the age of ubiquitous computing : IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan /
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cyberspace security and defense : research issues /
Published 2005
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Cryptography and network security : principles and practice /
by
Stallings, William
Published 2014
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Internet security for business /
by
Bernstein, Terry
Published 1996
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Digital money : the new era of internet commerce /
by
Lynch, Daniel C.
Published 1996
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Data encryption (Computer science)
Institution
MUT
(10)
Library
mut
(10)
Format
MONOGRAPHS
(10)
Call Number
Q - Science
(4)
T - Technology
(4)
H - Social Science
(2)
Author
Stallings, William
(3)
Axelrod, C. Warren
(1)
Bernstein, Terry
(1)
Lynch, Daniel C.
(1)
Nichols, Randall K.
(1)
Language
English
(10)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs