Search Results

You searched for: subject "Data encryption (Computer science)+United States." Remove constraint

Search Results

Cover image for Information security and privacy in network environments

Information security and privacy in network environments

Location Call # Status
Joyner - Fed Docs Stacks ASK AT REFERENCE DESK ✔ Available
Cover image for Encryption made simple for lawyers

Encryption made simple for lawyers

Location Call # Status
Joyner - General Stacks QA76.9 .A25 R49 2015 ✔ Available
Cover image for The encryption debate

The encryption debate

Location Call # Status
Joyner - Fed Docs Stacks Y 4.J 89/2:S.HRG.105-415 ✔ Available
Cover image for Encryption

Encryption

Location Call # Status
Joyner - Fed Docs Stacks Y 4.IN 8/16:R 44/2 ✔ Available
Cover image for H.R. 2413, the Computer Security Enhancement Act of 1999

H.R. 2413, the Computer Security Enhancement Act of 1999

Location Call # Status
Joyner - Fed Docs Stacks ASK AT REFERENCE DESK ✔ Available
Cover image for Decrypting the encryption debate

Decrypting the encryption debate

Location
Access Content Online
Cover image for S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act

S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act

Location Call # Status
Joyner - Fed Docs Stacks Y 4.C 73.7:S.HRG.104-621 ✔ Available
Cover image for S. 1726, the Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act

S. 1726, the Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE" Act

Location Call # Status
Joyner - Fed Docs Stacks Y 4.C 73.7:S.HRG.104-617 ✔ Available
Cover image for The electronic privacy papers

The electronic privacy papers

Location Call # Status
Joyner - General Stacks JC596.2.U5 E44 1997 ✔ Available