Dangos 1 - 14 canlyniadau o 14 ar gyfer chwilio 'history of cryptography', amser ymholiad: 0.03e Mireinio'r Canlyniadau
  1. 1
    gan Chen, Kefei ed
    Cyhoeddwyd 2004
    Pynciau: ...Cryptography China History Congresses. 10984...
    Printed Book
  2. 2
    Pynciau: ...Cryptography...
    Printed Book
  3. 3
    gan Kippenhahn, Rudolf
    Cyhoeddwyd 1999
    Pynciau: ...Cryptography...
  4. 4
    gan Kippenhahn, Rudolf
    Cyhoeddwyd 1999
    Pynciau: ...Cryptography History. 5002...
    Printed Book
  5. 5
    gan Blahut, Richard E.
    Cyhoeddwyd 2014
    Tabl Cynhwysion: ...Machine generated contents note: 1.Introduction -- 1.1.Classical cryptography -- 1.2.Notions...
    Printed Book
  6. 6
    gan Singh, Simon
    Cyhoeddwyd 1999
    Pynciau: ...Cryptography- history Data encryption- history...
    Printed Book
  7. 7
    gan Copeland, B Jack; Author
    Cyhoeddwyd 2010
    Pynciau: ...Cryptography-Germany-History...
    Printed Book
  8. 8
    gan Cozzens, Margaret B.
    Cyhoeddwyd 2013
    Tabl Cynhwysion: ... cryptography : attacks I -- Classical cryptography : attacks II -- Modern symmetric encryption -- Introduction...
    Printed Book
  9. 9
    gan Haag, Michael
    Cyhoeddwyd 2004
    Pynciau: ...Fiction-English Literature Da Vinci Code-Guide Cryptography-literature Jesus Christ-literature...
    Printed Book
  10. 10
    gan Jennings, Christian
    Cyhoeddwyd 2018
    Pynciau: ...fast 949792 Cryptography History...
    Printed Book
  11. 11
    gan Mollin, Richard A.
    Cyhoeddwyd 2005
    Pynciau: ...Data encryption- history Cryptography- history Compuiter- access control Computer security Computer...
    Printed Book
  12. 12
    Pynciau: ...Turing, Alan Mathison, -- 1912-1954. Mathematics -- Great Britain -- History -- 20th century...
    Printed Book
  13. 13
    gan Gollmann, Dieter
    Cyhoeddwyd 2011
    Tabl Cynhwysion: ...History of computer security -- Managing security -- Foundations of computer security...
    Printed Book
  14. 14
    gan Chapple, Mike
    Cyhoeddwyd 2015
    Tabl Cynhwysion: ... 7: Weaponizing Cyberspace: A History -- Chapter 8: Nonstate Actors in Cyberwar -- Chapter 9: Defense...
    Printed Book