Mostrar 1 - 14 resultats de 14 per cerca 'history of cryptography', hora de la petició: 0.03sec Refinar resultats
  1. 1
    per Chen, Kefei ed
    Publicat 2004
    Matèries: ...Cryptography China History Congresses. 10984...
    Printed Book
  2. 2
    Matèries: ...Cryptography...
    Printed Book
  3. 3
    per Kippenhahn, Rudolf
    Publicat 1999
    Matèries: ...Cryptography...
  4. 4
    per Kippenhahn, Rudolf
    Publicat 1999
    Matèries: ...Cryptography History. 5002...
    Printed Book
  5. 5
    per Blahut, Richard E.
    Publicat 2014
    Taula de continguts: ...Machine generated contents note: 1.Introduction -- 1.1.Classical cryptography -- 1.2.Notions...
    Printed Book
  6. 6
    per Singh, Simon
    Publicat 1999
    Matèries: ...Cryptography- history Data encryption- history...
    Printed Book
  7. 7
    per Copeland, B Jack; Author
    Publicat 2010
    Matèries: ...Cryptography-Germany-History...
    Printed Book
  8. 8
    per Cozzens, Margaret B.
    Publicat 2013
    Taula de continguts: ... cryptography : attacks I -- Classical cryptography : attacks II -- Modern symmetric encryption -- Introduction...
    Printed Book
  9. 9
    per Haag, Michael
    Publicat 2004
    Matèries: ...Fiction-English Literature Da Vinci Code-Guide Cryptography-literature Jesus Christ-literature...
    Printed Book
  10. 10
    per Jennings, Christian
    Publicat 2018
    Matèries: ...fast 949792 Cryptography History...
    Printed Book
  11. 11
    per Mollin, Richard A.
    Publicat 2005
    Matèries: ...Data encryption- history Cryptography- history Compuiter- access control Computer security Computer...
    Printed Book
  12. 12
    Matèries: ...Turing, Alan Mathison, -- 1912-1954. Mathematics -- Great Britain -- History -- 20th century...
    Printed Book
  13. 13
    per Gollmann, Dieter
    Publicat 2011
    Taula de continguts: ...History of computer security -- Managing security -- Foundations of computer security...
    Printed Book
  14. 14
    per Chapple, Mike
    Publicat 2015
    Taula de continguts: ... 7: Weaponizing Cyberspace: A History -- Chapter 8: Nonstate Actors in Cyberwar -- Chapter 9: Defense...
    Printed Book