|
41.
|
Coding theorems of classical and quantum information theory
by Parthasarathy, K. R. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Hindustan Book Agency, 2007Availability: Items available for loan: [Call number: 003.54 PAR] (1).
|
|
42.
|
Multimedia fingerprinting forensics for traitor tracing
by Liu, K. J. Ray. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Hindawi Publishing Corporation, 2005Availability: Items available for loan: [Call number: 005.82 LIU] (1).
|
|
43.
|
Cryptonomicon
by Stephenson, Neal. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Avon Books, 2002Availability: Items available for loan: [Call number: 813.54 STE] (1).
|
|
44.
|
Distributed systems and networks
by Buchanan, William. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 004.36 BUC] (4).
|
|
45.
|
Defending your digital assets: againts hackers, crackers, spies and theieves
by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
|
|
46.
|
Implementing Virtual Private Networks
by Brown, Steven. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.754 BRO] (1).
|
|
47.
|
Cryptographic boolean functions and applications
by Cusick, Thomas W | Stanica, Pantelimon. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 CUS] (1).
|
|
48.
|
Cryptography and network security : principles and practice
by Stallings, William. Edition: 5th ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
|
|
49.
|
Surveillance or security? : the risks posed by new wiretapping technologies
by Landau, Susan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2011Availability: Items available for loan: [Call number: 363.252 LAN] (1).
|
|
50.
|
Burdens of proof : cryptographic culture and evidence law in the age of electronic documents
by Blanchette, Jean-Franc�ois. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2012Availability: Items available for loan: [Call number: 347.064 BLA] (1).
|
|
51.
|
Rethinking public key infrastructures and digital certificates: Building in privacy
by Brands, Stefan A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
|
|
52.
|
Privacy on the line : the politics of wiretapping and encryption
by Diffie, Whitfield | Landau, Susan. Edition: Updated & expanded ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Cambridge: MIT Press, 2007Availability: Items available for loan: [Call number: 342.730858 DIF] (1).
|
|
53.
|
Labyrinth key
by Hendrix, Howard V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Ballantine Books, 2004Availability: Items available for loan: [Call number: 813.54 HEN] (1).
|
|
54.
|
Cryptographics : exploiting graphics cards for security
by Keromytis, Angelos D | Cook, Debra L. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 COO] (1).
|
|
55.
|
Cryptanalytic attacks on RSA
by Yan, Song Y. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
|
|
56.
|
Cryptographic engineering
by Koc, Cetin Kaya. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
|
|
57.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
58.
|
Algebraic cryptanalysis
by Bard, Gregory V. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BAR] (1).
|
|
59.
|
Multimedia data hiding
by Wu, Min | Liu, Bede. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 006.7 WUM] (1).
|
|
60.
|
Modern cryptology : a tutorial
by Brassard, Gilles. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).
|