441. Cryptography and network security : principles and practice /: principles and practice. (2022) Authors: Stallings, William Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
442. Cryptography with shrinking generators : fundamentals and applications of keystream sequence generators based on irregular decimation /: fundamentals and applications of keystream sequence generators based on irregular decimation. (2019) Authors: Díaz Cardell, Sara; Fúster Sabater, Amparo Record Type: Book Extent: 1 online resource (xi, 101 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
443. Troubleshooting for network operators : the road to a new paradigm with encrypted traffic /: the road to a new paradigm with encrypted traffic. (2023) Authors: Tong, Van Van; Souihi, Sami; Tran, Hai Anh; Mellouk, Abdelhamid Record Type: Book Extent: 1 online resource (192 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
444. Noiseless steganography : the key to covert communications /: the key to covert communications. (2012) Other Names: Desoky, Abdelrahman Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
445. Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts /: securing and preventing attacks on cryptocurrencies, decentralized applications, nfts, and smart contracts. ([2022]) Authors: III, Poston, Howard E Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
446. Cryptography for payment professionals. (2023) Authors: Dubinsky, Ilya Record Type: Book Extent: 1 online resource (202 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
447. Next generation SSH2 implementation : securing data in motion /: securing data in motion. (2011) Other Names: Liu, Dale Record Type: Book Extent: 1 online resource (336 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
448. Secret history : the story of cryptology /: the story of cryptology. (2016) Other Names: Bauer, Craig P Record Type: Book Extent: 1 online resource (620 pages), (58 illustrations) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
449. Hardware Security. (2014) Other Names: Mukhopadhyay, Debdeep Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
450. Cryptographic Boolean functions and applications. (2009) Other Names: Cusick, Thomas W, 1943-; Stănică, Pantelimon Record Type: Book Extent: 1 online resource (248 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗