GPJ

Vis søgefilter Nulstil

Vis mig kun

Cryptography of Dante

Cryptography of Dante

Arensberg, Walter

104,11 DKK

Prodromi, or Discoveries in the Bacon Cipher Problem

Prodromi, or Discoveries in the Bacon Cipher Problem

Wigston, William Francis C.

59,77 DKK

Shadow Libraries

Shadow Libraries

Karaganis, Joe

177,19 DKK

Hermes Stella

Hermes Stella

Wigston, William Francis C.

77,76 DKK

Concerning the Bi-Literal Cypher of Francis Bacon, Discovered in His Works

Concerning the Bi-Literal Cypher of Francis Bacon, Discovered in His Works

Gallup, Elizabeth Wells

77,76 DKK

RFID Security

RFID Security

Zhang, Yan

1240,73 DKK

Mystery of the Marbles

Mystery of the Marbles

Stilwell, Charles B.

59,77 DKK

Error Correcting Coding and Security for Data Networks

Error Correcting Coding and Security for Data Networks

Semenov, Sergei

1240,73 DKK

New Approaches for Security, Privacy and Trust in Complex Environments

New Approaches for Security, Privacy and Trust in Complex Environments

Solms, Rossouw von

875,33 DKK

Cryptography or the History, Principles, and Practice of Cipher-Writing

Cryptography or the History, Principles, and Practice of Cipher-Writing

Hulme, F. Edward

68,60 DKK

Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos

Ramakrishnan, S.

403,64 DKK

Fundamental Principles of the Baronian Ciphers

Fundamental Principles of the Baronian Ciphers

Falyan, Georg

59,77 DKK

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government

Grzech, Adam

1240,73 DKK

Security without Obscurity

Security without Obscurity

Stapleton, Jeff

403,64 DKK

Protecting Information

Protecting Information

Wootters, William K.

802,25 DKK

Secure Information Networks

Secure Information Networks

Preneel, Bart

2190,77 DKK

Security in the Information Society

Security in the Information Society

Aslan, Heba K.

1240,73 DKK

Complexity and Cryptography

Complexity and Cryptography

Welsh, Dominic

1240,73 DKK

Cryptographic and Information Security Approaches for Images and Videos

Cryptographic and Information Security Approaches for Images and Videos

Ramakrishnan, S.

403,64 DKK

Computational Complexity

Computational Complexity

Barak, Boaz

509,93 DKK

Green Computing in Network Security

Green Computing in Network Security

Dwivedi, Rinky

436,85 DKK

Green Computing in Network Security

Green Computing in Network Security

Dwivedi, Rinky

436,85 DKK

Nanoelectronic Devices for Hardware and Software Security

Nanoelectronic Devices for Hardware and Software Security

Raj, Balwinder

436,85 DKK

Stuxnet to Sunburst

Stuxnet to Sunburst

Jenkinson, Andrew

273,24 DKK

Introduction to Cryptocurrencies

Introduction to Cryptocurrencies

Georgitseas, Panagiotis

329,95 DKK

Essential Enterprise Blockchain Concepts and Applications

Essential Enterprise Blockchain Concepts and Applications

Saini, Deepak Kumar

692,63 DKK

Security Hippie

Security Hippie

Engel, Barak

317,82 DKK

Behavioral Cybersecurity

Behavioral Cybersecurity

Winston-Proctor, Cynthia E.

177,19 DKK

In-Depth Guide to Mobile Device Forensics

In-Depth Guide to Mobile Device Forensics

Easttom, Chuck

403,64 DKK

Crypto Wars

Crypto Wars

Jarvis, Craig

265,81 DKK

IoT Applications, Security Threats, and Countermeasures

IoT Applications, Security Threats, and Countermeasures

Ravichandran, P.

436,85 DKK

Modern Cryptography with Proof Techniques and Implementations

Modern Cryptography with Proof Techniques and Implementations

Lee, Wai Kong

403,64 DKK

AI and Deep Learning in Biometric Security

AI and Deep Learning in Biometric Security

Ramachandra, Raghavendra

436,85 DKK

Cybersecurity

Cybersecurity

Saini, Hemraj

436,85 DKK

Inside Blockchain, Bitcoin, and Cryptocurrencies

Inside Blockchain, Bitcoin, and Cryptocurrencies

Chowdhury, Niaz

403,64 DKK

Cryptography Apocalypse

Cryptography Apocalypse

Grimes, Roger A.

196,23 DKK