GPJ

Vis mig kun

Baconian Mint

Baconian Mint

Willis, William

59,77 DKK

Bacon Is Shakespeare

Bacon Is Shakespeare

Durning-Lawrence, Edwin

85,76 DKK

Boycotted Shakespeare Facts

Boycotted Shakespeare Facts

Parsons, J. Denham

59,77 DKK

Some Acrostic Signatures of Francis Bacon, Baron Verulam of Verulam, Viscount St. Alban

Some Acrostic Signatures of Francis Bacon, Baron Verulam of Verulam, Viscount St. Alban

Booth, William Stone

114,00 DKK

Cryptography of Dante

Cryptography of Dante

Arensberg, Walter

104,11 DKK

Prodromi, or Discoveries in the Bacon Cipher Problem

Prodromi, or Discoveries in the Bacon Cipher Problem

Wigston, William Francis C.

59,77 DKK

Hermes Stella

Hermes Stella

Wigston, William Francis C.

77,76 DKK

Concerning the Bi-Literal Cypher of Francis Bacon, Discovered in His Works

Concerning the Bi-Literal Cypher of Francis Bacon, Discovered in His Works

Gallup, Elizabeth Wells

77,76 DKK

RFID Security

RFID Security

Zhang, Yan

1240,73 DKK

Mystery of the Marbles

Mystery of the Marbles

Stilwell, Charles B.

59,77 DKK

Error Correcting Coding and Security for Data Networks

Error Correcting Coding and Security for Data Networks

Semenov, Sergei

1240,73 DKK

New Approaches for Security, Privacy and Trust in Complex Environments

New Approaches for Security, Privacy and Trust in Complex Environments

Solms, Rossouw von

875,33 DKK

Cryptography or the History, Principles, and Practice of Cipher-Writing

Cryptography or the History, Principles, and Practice of Cipher-Writing

Hulme, F. Edward

68,60 DKK

Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos

Ramakrishnan, S.

403,64 DKK

Fundamental Principles of the Baronian Ciphers

Fundamental Principles of the Baronian Ciphers

Falyan, Georg

59,77 DKK

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

Grzech, Adam

1240,73 DKK

Security without Obscurity

Security without Obscurity

Stapleton, Jeff

403,64 DKK

Protecting Information

Protecting Information

Wootters, William K.

802,25 DKK

Secure Information Networks

Secure Information Networks

Preneel, Bart

2190,77 DKK

Security in the Information Society

Security in the Information Society

Aslan, Heba K.

1240,73 DKK

Complexity and Cryptography

Complexity and Cryptography

Welsh, Dominic

1240,73 DKK

Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos

Ramakrishnan, S.

403,64 DKK

Computational Complexity

Computational Complexity

Barak, Boaz

509,93 DKK

Green Computing in Network Security

Green Computing in Network Security

Dwivedi, Rinky

436,85 DKK

Green Computing in Network Security

Green Computing in Network Security

Dwivedi, Rinky

436,85 DKK

Nanoelectronic Devices for Hardware and Software Security

Nanoelectronic Devices for Hardware and Software Security

Raj, Balwinder

436,85 DKK

Stuxnet to Sunburst

Stuxnet to Sunburst

Jenkinson, Andrew

273,24 DKK

Introduction to Cryptocurrencies

Introduction to Cryptocurrencies

Georgitseas, Panagiotis

329,95 DKK

Essential Enterprise Blockchain Concepts and Applications

Essential Enterprise Blockchain Concepts and Applications

Saini, Deepak Kumar

692,63 DKK

Security Hippie

Security Hippie

Engel, Barak

317,82 DKK