41. Coding theorems of classical and quantum information theory

by Parthasarathy, K. R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Hindustan Book Agency, 2007Availability: Items available for loan: [Call number: 003.54 PAR] (1).
42. Multimedia fingerprinting forensics for traitor tracing

by Liu, K. J. Ray.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Hindawi Publishing Corporation, 2005Availability: Items available for loan: [Call number: 005.82 LIU] (1).
43. Cryptonomicon

by Stephenson, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Avon Books, 2002Availability: Items available for loan: [Call number: 813.54 STE] (1).
44. Distributed systems and networks

by Buchanan, William.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2004Availability: Items available for loan: [Call number: 004.36 BUC] (4).
45. Defending your digital assets: againts hackers, crackers, spies and theieves

by Nichols, Randall K | Ryan, Daniel J | Ryan, Julie C. H.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.8 NIC] (1).
46. Implementing Virtual Private Networks

by Brown, Steven.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2000Availability: Items available for loan: [Call number: 005.754 BRO] (1).
47. Cryptographic boolean functions and applications

by Cusick, Thomas W | Stanica, Pantelimon.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: Elsevier, 2009Availability: Items available for loan: [Call number: 005.8 CUS] (1).
48. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 5th ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River: Prentice Hall, 2011Availability: Items available for loan: [Call number: 005.82 STA] (1).
49. Surveillance or security? : the risks posed by new wiretapping technologies

by Landau, Susan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2011Availability: Items available for loan: [Call number: 363.252 LAN] (1).
50. Burdens of proof : cryptographic culture and evidence law in the age of electronic documents

by Blanchette, Jean-Franc�ois.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2012Availability: Items available for loan: [Call number: 347.064 BLA] (1).
51. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
52. Privacy on the line : the politics of wiretapping and encryption

by Diffie, Whitfield | Landau, Susan.

Edition: Updated & expanded ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2007Availability: Items available for loan: [Call number: 342.730858 DIF] (1).
53. Labyrinth key

by Hendrix, Howard V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Ballantine Books, 2004Availability: Items available for loan: [Call number: 813.54 HEN] (1).
54. Cryptographics : exploiting graphics cards for security

by Keromytis, Angelos D | Cook, Debra L.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.82 COO] (1).
55. Cryptanalytic attacks on RSA

by Yan, Song Y.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.82 YAN] (1).
56. Cryptographic engineering

by Koc, Cetin Kaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
57. Advances in information processing and protection

by Pejas, Jerzy | Saeed, Khalid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
58. Algebraic cryptanalysis

by Bard, Gregory V.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Dordrecht: Springer, 2009Availability: Items available for loan: [Call number: 005.82 BAR] (1).
59. Multimedia data hiding

by Wu, Min | Liu, Bede.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 006.7 WUM] (1).
60. Modern cryptology : a tutorial

by Brassard, Gilles.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 1988Availability: Items available for loan: [Call number: 004 BRA] (1).

Powered by Koha