Suggestion de sujets dans votre recherche.
Suggestion de sujets dans votre recherche.
Cryptography
6
History
4
Computer security
2
Data encryption (Computer science)
2
Codierungstheorie
1
Coding theory
1
Computer crimes
1
Computercriminaliteit
1
Cryptography-Germany-History
1
Cryptography-Great Britain-History
1
Cyber intelligence (Computer security)
1
Electronic intelligence
1
Kryptologie
1
Lorenz cipher system
1
Mathematics
1
Military intelligence
1
Security measures
1
Telecommunication
1
Turing, Alan Mathison, -- 1912-1954. Mathematics -- Great Britain -- History -- 20th century. Computer science -- Great Britain -- History -- 20th century
1
World War, 1939-1945-Cryptography
1
World War, 1939-1945-Electronic intelligence-Great Britain
1
-
1par Chen, Kefei edSujets: “...Cryptography China History Congresses. 10984...”
Publié 2004
Printed Book -
2Sujets: “...Cryptography...”
Printed Book -
3
-
4
-
5par Blahut, Richard E.Table des matières: “...Machine generated contents note: 1.Introduction -- 1.1.Classical cryptography -- 1.2.Notions...”
Publié 2014
Printed Book -
6par Singh, SimonSujets: “...Cryptography- history Data encryption- history...”
Publié 1999
Printed Book -
7
-
8par Cozzens, Margaret B.Table des matières: “... cryptography : attacks I -- Classical cryptography : attacks II -- Modern symmetric encryption -- Introduction...”
Publié 2013
Printed Book -
9par Haag, MichaelSujets: “...Fiction-English Literature Da Vinci Code-Guide Cryptography-literature Jesus Christ-literature...”
Publié 2004
Printed Book -
10
-
11par Mollin, Richard A.Sujets: “...Data encryption- history Cryptography- history Compuiter- access control Computer security Computer...”
Publié 2005
Printed Book -
12par S. Barry Cooper and Andrew Hodges,edSujets: “...Turing, Alan Mathison, -- 1912-1954. Mathematics -- Great Britain -- History -- 20th century...”
Publié 2016
Printed Book -
13par Gollmann, DieterTable des matières: “...History of computer security -- Managing security -- Foundations of computer security...”
Publié 2011
Printed Book -
14par Chapple, MikeTable des matières: “... 7: Weaponizing Cyberspace: A History -- Chapter 8: Nonstate Actors in Cyberwar -- Chapter 9: Defense...”
Publié 2015
Printed Book