Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography
- Coding theory 16
- Computer security 16
- Data encryption (Computer science) 15
- Mathematics 12
- Security measures 9
- Number theory 8
- Ciphers 6
- Geometry, Algebraic 6
- World War, 1939-1945 6
- History 5
- Algorithms 4
- Computer Security 4
- Computer networks 4
- Foreign relations 4
- ciphers (codes) 4
- Algebra 3
- Computer science 3
- Computers 3
- Cryptographers 3
- Group theory 3
- Quantum theory 3
- Algebra, Boolean 2
- Arithmetical algebraic geometry 2
- Communism 2
- Curves, Elliptic 2
- Espionage, Soviet 2
- Information storage and retrieval systems 2
- Internet 2
- Military intelligence 2
-
1
The Comanche code talkers of World War II
Published 2002Full text (MFA users only)
Electronic eBook -
2
-
3
-
4
Basics of contemporary cryptography for IT practitioners
Published 2005Full text (MFA users only)
Electronic eBook -
5
ZSeries Trusted Key Entry (TKE) version 4.2 update
Published 2004Full text (MFA users only)
Electronic eBook -
6
-
7
IBM eserver zSeries 990 (z990) cryptography implementation
Published 2004Full text (MFA users only)
Electronic eBook -
8
-
9
Quantum communication and security
Published 2007Full text (MFA users only)
Electronic Conference Proceeding eBook -
10
The reader of gentlemen's mail : Herbert O. Yardley and the birth of American codebreaking
Published 2004Full text (MFA users only)
Electronic eBook -
11
Boolean functions in cryptology and information security
Published 2008Full text (MFA users only)
Electronic Conference Proceeding eBook -
12
Codes and Ciphers : Julius Caesar, the ENIGMA, and the Internet.
Published 2001Full text (MFA users only)
Electronic eBook -
13
User's Guide tp Crytography and Standards.
Published 2004Full text (MFA users only)
Electronic eBook -
14
Physics and Theoretical Computer Science : From Numbers and Languages to (quantum) Cryptography.
Published 2007Full text (MFA users only)
Electronic eBook -
15
Nanomechanics and nanoelectronics : molecule-size machines
Published 2004Full text (MFA users only)
Electronic eBook -
16
Security : secrets, intruders and ID tags.
Published 2003Full text (MFA users only)
Electronic eBook -
17
Modelling cyber security : approaches, methodology, strategies
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
18
-
19
Secret messages : codebreaking and American diplomacy, 1930-1945
Published 2000Full text (MFA users only)
Electronic eBook -
20