Search Results

You searched for: subject "Computer security." Remove constraint

Search Results

Cover image for Lectures on data security

Lectures on data security

Location Call # Status
Joyner - General Stacks QA76.9.A25 L46 1999 ✔ Available
Cover image for Information security

Information security

Location Call # Status
Joyner - General Stacks QA76.9.A25 L663 1992 ✔ Available
Cover image for Computer security and industrial cryptography

Computer security and industrial cryptography

Location Call # Status
Joyner - General Stacks QA76.9.A25 C6373 1993 ✔ Available
Cover image for Computer security, ESORICS 98

Computer security, ESORICS 98

Location Call # Status
Joyner - General Stacks QA76.9.A25 E98 1998 ✔ Available
Cover image for Recent advances in RSA cryptography

Recent advances in RSA cryptography

Location Call # Status
Joyner - General Stacks QA76.9.A25 K38 2001 ✔ Available
Cover image for Modern cryptography, probabilistic proofs, and pseudorandomness

Modern cryptography, probabilistic proofs, and pseudorandomness

Location Call # Status
Joyner - General Stacks QA76.9.A25 G64 1999 ✔ Available
Cover image for Cryptography decrypted

Cryptography decrypted

Location Call # Status
Joyner - General Stacks QA76.9.A25 M44 2001 ✔ Available
Cover image for The use of passwords for controlled access to computer resources

The use of passwords for controlled access to computer resources

Location Call # Status
Joyner - Fed Docs Stacks C 13.10:500-9 ✔ Available