Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography 1,451
- Computer security 403
- Data encryption (Computer science) 336
- World War, 1939-1945 191
- Security measures 186
- History 156
- Computers 119
- Access control 111
- Coding theory 107
- Computer networks 88
- Public key cryptography 78
- Mathematics 73
- Data protection 68
- Military intelligence 63
- Ciphers 61
- Electronic intelligence 50
- Secret service 49
- Number theory 44
- Telecommunication 41
- Data processing 39
- Cryptology 35
- Security 35
- Algorithms 31
- Participation, Indian 29
- Information theory 28
- Quantum computers 28
- Campaigns 27
- Quantum theory 27
- Computer science 24
- Foreign relations 24
-
101
Internet An Overview of Key Technology Policy Issues Affecting Its Use and Growth.
Published 2000Subjects: Full Text (via ProQuest)
Electronic eBook -
102
Internet An Overview of Key Technology Policy Issues Affecting Its Use and Growth.
Published 2000Subjects: Full Text (via ProQuest)
Electronic eBook -
103
Assessment of the Current and Future International Market for Software Products Containing Encryption
Published 1994Subjects: “…Cryptography.…”
Full Text (via ProQuest)
Electronic eBook -
104
Secret key cryptography : ciphers, from simple to unbreakable /
Published 2022Subjects: “…Cryptography.…”
Full Text (via O'Reilly/Safari)
Audio -
105
Chinese remainder theorem : applications in computing, coding, cryptography /
Published 1996Subjects: Full Text (via Internet Archive)
eBook -
106
Secret key cryptography : ciphers, from simple to unbreakable /
Published 2022Subjects: “…Cryptography.…”
Full Text (via O'Reilly/Safari)
eBook -
107
Secret Key Cryptography, Video Edition /
Published 2022Subjects: “…Cryptography.…”
Streaming Video (via O'Reilly/Safari)
Video -
108
Secret key cryptography ciphers, from simple to unbreakable /
Published 2022Subjects: “…Cryptography.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
109
A classical introduction to cryptography applications for communications security /
Published 2006Subjects: Online Access (A-Z Journals and Newspapers)
Electronic eBook -
110
Cryptography engineering design principles and practical applications /
Published 2010Subjects: “…Cryptography.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
111
Practical mathematical cryptography.
Published 2023Subjects: Full Text (via Taylor & Francis)
eBook -
112
Public-key cryptography : theory and practice /
Published 2009Subjects: “…Public key cryptography.…”
Full Text (via O'Reilly/Safari)
Electronic eBook -
113
Steganography Techniques for Digital Images /
Published 2019Subjects: Full Text (via Springer)
eBook -
114
Efficient secure two-party protocols techniques and constructions /
Published 2010Subjects: Full Text (via Springer)
Electronic eBook -
115
Codebreakers' victory : how the Allied cryptographers won World War II /
Published 2003Subjects:Book -
116
Probabilistic and statistical methods in cryptology an introduction by selected topics /
Published 2004Subjects: Full Text (via Springer)
Electronic eBook -
117
Secure communications and asymmetric cryptosystems.
Published 2019Subjects: “…Cryptography.…”
Full Text (via Taylor & Francis)
eBook -
118
Understanding and applying cryptography and data security /
Published 2009Subjects: Full Text (via Taylor & Francis)
eBook -
119
Group theory, statistics, and cryptography : AMS Special Session Combinatorial and Statistical Group Theory, April 12-13, 2003, New York University /
Published 2004Subjects: Full Text (via ProQuest)
Electronic Conference Proceeding eBook -
120
Basics of contemporary cryptography for IT practitioners /
Published 2005Subjects: Full Text (via ProQuest)
eBook