Refine your search

Your search returned 26 results.

Not what you expected? Check for suggestions
Applied cryptography: protocols, algorithms and source code in C Bruce Schneier

by Bruce Schneier.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Availability: Items available for loan: Central Library (CL)Call number: 005.82 SCH (12). Checked out (1).
Secure communicating systems : design, analysis, and implementation Michael R.A. Huth.

by Huth, Michael.

Publisher: Cambridge ; New York : Cambridge University Press, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 HUT (1).
Security for telecommunications network management Moshe Rozenblit.

by Rozenblit, Moshe.

Publisher: New York : Institute of Electrical and Electronics Engineers, 1999Availability: Items available for loan: Central Library (CL)Call number: 621.382 ROZ (1).
Wireless networks: multiuser detection in cross-layer design multiuser detection in cross-layer design Cristina Comaniciu, Narayan B. Mandayam, H. Vincent Poor.

by Comaniciu, Cristina | Mandayam, Narayan B | Poor, H. Vincent.

Publisher: New York : Springer, 2005Online access: Publisher description | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 621.3821 COM (1).
Cryptography, information theory, and error-correction: a handbook for the 21st century a handbook for the 21st century Aiden A. Bruen, Mario A. Forcinito.

by Bruen, Aiden A | Forcinito, Mario, 1962-.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 BRU (1).
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce, 1963-.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York : Wiley, c1996Online access: Click here to access online | Publisher description | Table of Contents Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 SCH (2).
Contemporary cryptology : the science of information integrity edited by Gustavus J. Simmons.

by Simmons Gustavas J | Simmons, Gustavus J | Institute of Electrical and Electronics Engineers.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Piscataway, NJ : IEEE Press, c1992Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.82 SIM (1).
Cryptography, a primer / Alan G. Konheim.

by Konheim, Alan G.

Publisher: New York : Wiley, c1981Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,KON (3).
Writing disaster recovery plans for telecommunications networks and LAN / Leo A. Wrobel.

by Wrobel, Leo A.

Publisher: Boston : Artech House, c1993Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 384,WRO (1). :
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,SCH (9).
Cryptography and secure communications / Man Young Rhee.

by Rhee, Man Young.

Publisher: Singapore ; New York : McGraw-Hill, c1994Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,RHE (1).
Primality and cryptography / Evangelos Kranakis.

by Kranakis, Evangelos.

Publisher: Stuttgart : Chichester [Sussex] ; New York : Teubner ; Wiley, c1986Online access: Publisher description | Table of Contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,KRA (3).
Cryptography, information theory, and error-correction : a handbook for the 21st century / Aiden A. Bruen, Mario A. Forcinito.

by Bruen, Aiden A | Forcinito, Mario, 1962-.

Publisher: Hoboken, N.J. : Wiley-Interscience, c2005Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,BRU (1).
Applied cryptography : protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New Delhi Packers c2006Online access: Contributor biographical information | Publisher description | Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,SCH (2).
Applied cryptography (E-Book) protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: (1).
Applied cryptography -(E-BOOK) Bruce Schneier.

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82 SCH (1).
Using the common criteria for IT security evaluation (E-Book) [Elektronisk resurs] / Debra S. Herrmann.

by Herrmann, Debra S.

Publisher: Boca Raton, Fla. : Auerbach Publications, c2003Online access: Click here to access online Availability: Items available for loan: Military College of Signals (MCS) (1).
Applied cryptography (E-BOOK) protocols, algorithms, and source code in C / Bruce Schneier.

by Schneier, Bruce.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: Military College of Signals (MCS) (1).
Secure communications : applications and management Roger J. Sutton.

by Sutton, Roger J.

Publisher: Chichester ; New York : J. Wiley, c2002Online access: Publisher description | Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,SUT (1).
Using the common criteria for IT security evaluation / Debra S. Herrmann.

by Herrmann, Debra S.

Publisher: Boca Raton, Fla. : Auerbach Publications, c2003Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,HER (1).
Information hiding in speech signals for secure communication / Wu Zhijun.

by Zhijun, Wu.

Publisher: Elsevier 2015Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.82,ZHI (1).
Smart grid : applications, communications, and security / Lars Torsten Berger & Krzysztof (Kris) Iniewski.

by Iniewski, Krzysztof, 1960- | [Berger, Lars T.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Hoboken, N.J. : Wiley, c2012Availability: Items available for loan: US-Pakistan Center for Advanced Studies in Energy (USPCAS-E)Call number: 621.319130285 SMA 2012 (1).
Applied cryptography: protocols, algorithms and source code in C Bruce Schneier

by Bruce Schneier.

Edition: 2nd ed. Publisher: New York : Wiley, c1996Availability: Items available for loan: Central Library (CL)Call number: 005.82 SCH (1).
Security without obscurity : a guide to cryptographic architectures / J.J. Stapleton.

by Stapleton, Jeffrey James [author.].

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boca Raton : CRC Press, Taylor & Francis Group, 2019Availability: Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.824,STA (1). :
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.