Search Results
You searched for:
subject
"Data encryption (Computer science)+United States."
Remove constraint
Showing 41 - 50 of 121 results
Search Results
Information security and privacy in network environments
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | ASK AT REFERENCE DESK | ✔ Available |
Encryption made simple for lawyers
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | QA76.9 .A25 R49 2015 | ✔ Available |
The encryption debate
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.J 89/2:S.HRG.105-415 | ✔ Available |
H.R. 2413, the Computer Security Enhancement Act of 1999
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | ASK AT REFERENCE DESK | ✔ Available |
S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.C 73.7:S.HRG.104-621 | ✔ Available |
S. 1726, the Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act
| Location | Call # | Status |
|---|---|---|
| Joyner - Fed Docs Stacks | Y 4.C 73.7:S.HRG.104-617 | ✔ Available |
The electronic privacy papers
| Location | Call # | Status |
|---|---|---|
| Joyner - General Stacks | JC596.2.U5 E44 1997 | ✔ Available |