Showing 1 - 14 results of 14 for search 'history of cryptography', tempo de consulta: 0.05s Limitar resultados
  1. 1
    por Chen, Kefei ed
    Publicado 2004
    Subjects: ...Cryptography China History Congresses. 10984...
    Printed Book
  2. 2
    Subjects: ...Cryptography...
    Printed Book
  3. 3
    por Kippenhahn, Rudolf
    Publicado 1999
    Subjects: ...Cryptography...
  4. 4
    por Kippenhahn, Rudolf
    Publicado 1999
    Subjects: ...Cryptography History. 5002...
    Printed Book
  5. 5
    por Blahut, Richard E.
    Publicado 2014
    Table of Contents: ...Machine generated contents note: 1.Introduction -- 1.1.Classical cryptography -- 1.2.Notions...
    Printed Book
  6. 6
    por Singh, Simon
    Publicado 1999
    Subjects: ...Cryptography- history Data encryption- history...
    Printed Book
  7. 7
    por Copeland, B Jack; Author
    Publicado 2010
    Subjects: ...Cryptography-Germany-History...
    Printed Book
  8. 8
    por Cozzens, Margaret B.
    Publicado 2013
    Table of Contents: ... cryptography : attacks I -- Classical cryptography : attacks II -- Modern symmetric encryption -- Introduction...
    Printed Book
  9. 9
    por Haag, Michael
    Publicado 2004
    Subjects: ...Fiction-English Literature Da Vinci Code-Guide Cryptography-literature Jesus Christ-literature...
    Printed Book
  10. 10
    por Jennings, Christian
    Publicado 2018
    Subjects: ...fast 949792 Cryptography History...
    Printed Book
  11. 11
    por Mollin, Richard A.
    Publicado 2005
    Subjects: ...Data encryption- history Cryptography- history Compuiter- access control Computer security Computer...
    Printed Book
  12. 12
    Subjects: ...Turing, Alan Mathison, -- 1912-1954. Mathematics -- Great Britain -- History -- 20th century...
    Printed Book
  13. 13
    por Gollmann, Dieter
    Publicado 2011
    Table of Contents: ...History of computer security -- Managing security -- Foundations of computer security...
    Printed Book
  14. 14
    por Chapple, Mike
    Publicado 2015
    Table of Contents: ... 7: Weaponizing Cyberspace: A History -- Chapter 8: Nonstate Actors in Cyberwar -- Chapter 9: Defense...
    Printed Book