Showing 1 - 14 results of 14 for search 'history of cryptography', am an iarratais: 0.05s Refine Results
  1. 1
    le Chen, Kefei ed
    Foilsithe 2004
    Ábhair: ...Cryptography China History Congresses. 10984...
    Printed Book
  2. 2
    Ábhair: ...Cryptography...
    Printed Book
  3. 3
    le Kippenhahn, Rudolf
    Foilsithe 1999
    Ábhair: ...Cryptography...
  4. 4
    le Kippenhahn, Rudolf
    Foilsithe 1999
    Ábhair: ...Cryptography History. 5002...
    Printed Book
  5. 5
    le Blahut, Richard E.
    Foilsithe 2014
    Clár Ábhair: ...Machine generated contents note: 1.Introduction -- 1.1.Classical cryptography -- 1.2.Notions...
    Printed Book
  6. 6
    le Singh, Simon
    Foilsithe 1999
    Ábhair: ...Cryptography- history Data encryption- history...
    Printed Book
  7. 7
    le Copeland, B Jack; Author
    Foilsithe 2010
    Ábhair: ...Cryptography-Germany-History...
    Printed Book
  8. 8
    le Cozzens, Margaret B.
    Foilsithe 2013
    Clár Ábhair: ... cryptography : attacks I -- Classical cryptography : attacks II -- Modern symmetric encryption -- Introduction...
    Printed Book
  9. 9
    le Haag, Michael
    Foilsithe 2004
    Ábhair: ...Fiction-English Literature Da Vinci Code-Guide Cryptography-literature Jesus Christ-literature...
    Printed Book
  10. 10
    le Jennings, Christian
    Foilsithe 2018
    Ábhair: ...fast 949792 Cryptography History...
    Printed Book
  11. 11
    le Mollin, Richard A.
    Foilsithe 2005
    Ábhair: ...Data encryption- history Cryptography- history Compuiter- access control Computer security Computer...
    Printed Book
  12. 12
    Ábhair: ...Turing, Alan Mathison, -- 1912-1954. Mathematics -- Great Britain -- History -- 20th century...
    Printed Book
  13. 13
    le Gollmann, Dieter
    Foilsithe 2011
    Clár Ábhair: ...History of computer security -- Managing security -- Foundations of computer security...
    Printed Book
  14. 14
    le Chapple, Mike
    Foilsithe 2015
    Clár Ábhair: ... 7: Weaponizing Cyberspace: A History -- Chapter 8: Nonstate Actors in Cyberwar -- Chapter 9: Defense...
    Printed Book