ORPP logo

Your search returned 39 results.

Sort
Results
21.
Algebraic Methods in Cryptography. by Series: Contemporary Mathematics
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Providence : American Mathematical Society, 2006Copyright date: ©2005
Online resources:
Availability: No items available.

22.
Error-Correcting Codes, Finite Geometries and Cryptography. by Series: Contemporary Mathematics
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Providence : American Mathematical Society, 2010Copyright date: ©2010
Online resources:
Availability: No items available.

23.
Computational and Combinatorial Group Theory and Cryptography. by Series: Contemporary Mathematics
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Providence : American Mathematical Society, 2012Copyright date: ©2012
Online resources:
Availability: No items available.

24.
Algorithmic Problems of Group Theory, Their Complexity, and Applications to Cryptography. by Series: Contemporary Mathematics
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Providence : American Mathematical Society, 2015Copyright date: ©2014
Online resources:
Availability: No items available.

25.
Highly Available WebSphere Business Integration Solutions. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Durham : I B M, 2004Copyright date: ©2004
Online resources:
Availability: No items available.

26.
Migrating Applications from Microsoft DNA to IBM WebSphere. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Durham : I B M, 2005Copyright date: ©2005
Online resources:
Availability: No items available.

27.
Configuration and Tuning GPFS for Digital Media Environments. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Durham : I B M, 2005Copyright date: ©2005
Online resources:
Availability: No items available.

28.
Elementary Cryptanalysis. by Series: Anneli Lax New Mathematical Library
Edition: 2nd ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Washington : American Mathematical Society, 2009Copyright date: ©2009
Online resources:
Availability: No items available.

29.
Cryptography's Role in Securing the Information Society. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Washington, D.C. : National Academies Press, 1996Copyright date: ©1996
Online resources:
Availability: No items available.

30.
Quantum Cryptography : Potentially Perfect Security. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boston : Technology Research News, 2002Copyright date: ©2003
Online resources:
Availability: No items available.

31.
Security : Secrets, Intruders and ID Tags. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boston : Technology Research News, 2003Copyright date: ©2003
Online resources:
Availability: No items available.

32.
Nanomechanics and Nanoelectronics : Molecule-Size Machines. by
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Boston : Technology Research News, 2004Copyright date: ©2004
Online resources:
Availability: No items available.

33.
The Reader of Gentlemen's Mail : Herbert O. Yardley and the Birth of American Codebreaking. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: New Haven : Yale University Press, 2014Copyright date: ©2008
Online resources:
Availability: No items available.

34.
Venona : Decoding Soviet Espionage in America. by Series: Annals of Communism Series
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: New Haven : Yale University Press, 1999Copyright date: ©2008
Online resources:
Availability: No items available.

35.
The Comanche Code Talkers of World War II. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Austin : University of Texas Press, 2003Copyright date: ©2003
Online resources:
Availability: No items available.

36.
U. S. Navy Codebreakers, Linguists, and Intelligence Officers Against Japan, 1910-1941 : A Biographical Dictionary. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Blue Ridge Summit : Rowman & Littlefield Publishers, Incorporated, 2015Copyright date: ©2015
Online resources:
Availability: No items available.

37.
Discrete Algebraic Methods : Arithmetic, Cryptography, Automata and Groups. by Series: De Gruyter Textbook Series
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Berlin/Boston : Walter de Gruyter GmbH, 2016Copyright date: ©2016
Online resources:
Availability: No items available.

38.
Breaking Japanese Diplomatic Codes : David Sissons and d Special Section During the Second World War. by Series: Asian Studies Series
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Canberra : ANU Press, 2013Copyright date: ©2013
Online resources:
Availability: No items available.

39.
Cryptography. by
Edition: 1st ed.
Material type: Text Text; Format: available online remote; Literary form: Not fiction
Publisher: Milton : River Publishers, 2017Copyright date: ©2017
Online resources:
Availability: No items available.

Pages

© 2024 Resource Centre. All rights reserved.