Your search returned 39 results.

Not what you expected? Check for suggestions
|
Computational number theory / Abhijit Das.

by Das, Abhijit, 1968-.

Publisher: Boca Raton, FL : CRC Press, c2013Availability: Items available for loan: Taylor's Library-TU [Call number: 512.70285 DAS 2013] (1).
Cryptographic Boolean functions and applications / Thomas W. Cusick and Pantelimon Stanica.

by Cusick, Thomas W, 1943- | Stanica, Pantelimon.

Publisher: Amsterdam : Academic Press/Elsevier, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 CUS 2009] (1).
Internet security : cryptographic principles, algorithms, and protocols / Man Young Rhee

by Rhee, Man Young.

Publisher: Chichester, England : John Wiley, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 RHE] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 3rd ed.Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA] (1).
Security [electronic resource] : secrets, intruders and ID tags.

by ebrary, Inc.

Publisher: [Boston] : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Implementing SSH [electronic resource] : strategies for optimizing the Secure Shell / Himanshu Dwivedi.

by Dwivedi, Himanshu | ebrary, Inc.

Publisher: Indianapolis, Ind. ; [Chichester] : Wiley, c2004Other title: Implementing secure shell.Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 4th ed.Publisher: New Delhi : Prentice Hall of India, 2008Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2008] (1).
Introduction to certificateless cryptography / Hu Xiong, Zhen Qin, and Athanasios V. Vasilakos.

by Xiong, Hu | Qin, Zhen, 1982- [author.] | Vasilakos, Athanasios.

Publisher: Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, [2017]Copyright date: ©2017Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 005.82 X6] (1).
Securing information and communications systems [electronic resource] : principles, technologies, and applications / Steven M. Furnell ... [et al.], editors.

by Furnell, Steven, 1970- | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Introduction to identity-based encryption [electronic resource] / Luther Martin.

by Martin, Luther | ebrary, Inc.

Publisher: Boston : Artech House, c2008Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Quantum cryptography [electronic resource] : potentially perfect security.

by ebrary, Inc.

Publisher: Boston, Mass. : Technology Research News, 2003Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Cryptography for dummies / by Chey Cobb.

by Cobb, Chey.

Publisher: Indianapolis, IN : Wiley Pub., c2004Availability: Items available for loan: Taylor's Library-TU [Call number: 005.82 COB 2004] (1).
Trusted platform module basics [electronic resource] : using TPM in embedded systems / by Steven Kinney.

by Kinney, Steven | ebrary, Inc.

Publisher: Amsterdam ; Boston : Elsevier Newnes, c2006Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Outsourcing information security [electronic resource] / C. Warren Axelrod.

by Axelrod, C. Warren | ebrary, Inc.

Publisher: Boston : Artech House, c2004Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for loan: [Call number: 005.8] (1).
Fully homomorphic encryption in real world applications / Ayantika Chatterjee, Khin Mi Mi Aung.

by Chatterjee, Ayantika [author.] | Aung, Khin Mi Mi [author.].

Publisher: Singapore : Springer, 2019Online access: An electronic book accessible through the World Wide Web; click to view Availability: Items available for reference: Taylor's Library-TU [Call number: 003.54] (1).
ExamWise for CIW security professional [electronic resource] : exam 1D0-470 / Chad M. Bayer.

by Bayer, Chad M | ebrary, Inc.

Publisher: Friendswood, Tex. : TotalRecall Publications, Inc., c2003Other title: Exam Wise for CIW security professional | CIW security professional.Online access: An electronic book accessible through the World Wide Web; click to view Availability: No items available
Cryptography and network security : principles and practice / William Stallings.

by Stallings, William.

Edition: 5th ed.Publisher: Boston, MA : Prentice Hall, c2011Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 STA 2011] (2).
Modelling cyber security : approaches, methodology, strategies / edited by Umberto Gori.

by NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 Venice, Italy).

Publisher: Amsterdam : IOS Press, c2009Availability: Items available for loan: Taylor's Library-TU [Call number: 005.8 NAT 2009] (1).