Central Library - Coimbatore

Online Public Access Catalog

Your search returned 290 results.

Not what you expected? Check for suggestions
Sort
Results
261.
Amazon cover image
Image from Amazon.com
Everyday Cryptography Fundamental Principles and Applications by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: OUP Oxford ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

262.
Amazon cover image
Image from Amazon.com
Mathematics of Public Key Cryptography by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Cambridge University Press ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

263.
Amazon cover image
Image from Amazon.com
Decoding Organization Bletchley Park, Codebreaking and Organization Studies by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Cambridge University Press ; 2012
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

264.
Amazon cover image
Image from Amazon.com
Advanced Linear Cryptanalysis of Block and Stream Ciphers by Series: Cryptology and Information Security Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2011
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

265.
Amazon cover image
Image from Amazon.com
Mercury: or the Secret and Swift Messenger Shewing How a Man May with Privacy and Speed Communicate His Thoughts to a Friend at Any Distance. Reprinted From the Third Edition (1708) by Series: Foundations of Semiotics
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: John Benjamins Publishing Company ; 1984
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

266.
Amazon cover image
Image from Amazon.com
Quantum Cryptography and Computing--theory and Implementation by Series: Information and Communication Security
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2010
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

267.
Amazon cover image
Image from Amazon.com
Modelling Cyber Security: Approaches, Methodology, Strategies by Series: NATO Science for Peace and Security Series. E: Human and Societal Dynamics
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2009
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

268.
Amazon cover image
Image from Amazon.com
Secret Language Codes, Tricks, Spies, Thieves, and Symbols by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: OUP Oxford ; 2010
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

269.
Amazon cover image
Image from Amazon.com
Introduction to Identity-Based Encryption by Series: Artech House Information Security and Privacy Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Artech House ; 2008
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

270.
Amazon cover image
Image from Amazon.com
Identity-Based Cryptography by Series: Cryptology and Information Security Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2009
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

271.
Amazon cover image
Image from Amazon.com
Boolean Functions in Cryptology and Information Security by Series: NATO Science for Peace and Security Series. D, Information and Communication Security
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2008
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

272.
Amazon cover image
Image from Amazon.com
Physics and Theoretical Computer Science by Series: NATO Security Through Science Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2007
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

273.
Amazon cover image
Image from Amazon.com
Data Acquisition Techniques Using PCs by
Edition: 2nd ed
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Academic Press ; 2003
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

274.
Amazon cover image
Image from Amazon.com
Quantum Communication and Security by Series: NATO Security Through Science Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2007
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

275.
Amazon cover image
Image from Amazon.com
Java Cryptography Extensions Practical Guide for Programmers by Series: The Practical Guides
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Morgan Kaufmann ; 2004
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

276.
Amazon cover image
Image from Amazon.com
Colossus : The Secrets of Bletchley Parks Code-breaking Computers by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Oxford University Press ; 2006
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

277.
Amazon cover image
Image from Amazon.com
Cryptography for Developers by
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Syngress ; 2007
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

278.
Amazon cover image
Image from Amazon.com
Basics Of Contemporary Cryptography For It Practitioners by Series: Series on Coding Theory and Cryptology
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: World Scientific ; 2005
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

279.
Amazon cover image
Image from Amazon.com
Applied Public Key Infrastructure by Series: Frontiers in Artificial Intelligence and Applications
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: IOS Press ; 2005
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

280.
Amazon cover image
Image from Amazon.com
Contemporary Cryptography by Series: Artech House Computer Security Series
Material type: Computer file Computer file; Format: electronic
Language: English
Publication details: Artech House ; 2005
Online resources:
Availability: Items available for reference: EBOOKS-EBSCO ACADEMIC COLLECTION: Not for loan (1).

Maintained by : Central Library, Amrita Vishwa Vidyapeetham, Coimbatore

TOTAL VISITORS
website counter