Libros sobre el tema "Secret-key cryptography"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 20 mejores mejores libros para su investigación sobre el tema "Secret-key cryptography".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Warner, Penny. The secret of the skeleton key. New York: Egmont USA, 2011.
Buscar texto completoGalbreath, Nick. Cryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Buscar texto completoCryptography for Internet and database applications: Developing secret and public key techniques with Java. Indianapolis, Ind: Wiley Pub., 2002.
Buscar texto completoSecret warriors: Key scientists, code breakers and propagandists of the Great War. London: Little, Brown, 2014.
Buscar texto completoNoiseless steganography: The key to covert communications. Boca Raton: Auerbach Publications, 2012.
Buscar texto completo1943-, Spector Ronald H., ed. Listening to the enemy: Key documents on the role of communications intelligence in the war with Japan. Wilmington, Del: Scholarly Resources Inc., 1988.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2006.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2010.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. University of Cambridge ESOL Examinations, 2012.
Buscar texto completoAssche, Gilles Van. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2012.
Buscar texto completoSecret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Buscar texto completoRubin, Frank. Secret Key Cryptography: Ciphers, from Simple to Unbreakable. Manning Publications Co. LLC, 2022.
Buscar texto completoGalbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2003.
Buscar texto completoGalbreath, Nick. Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java. Wiley & Sons, Incorporated, John, 2012.
Buscar texto completoDowning, Taylor. Secret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Little, Brown Book Group Limited, 2014.
Buscar texto completoSecret Warriors: Key Scientists, Code Breakers and Propagandists of the Great War. Abacus, 2001.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Taylor & Francis Group, 2012.
Buscar texto completoDesoky, Abdelrahman. Noiseless Steganography: The Key to Covert Communications. Auerbach Publishers, Incorporated, 2016.
Buscar texto completo