Explore: Cryptology And Information Theory Data Structures
Discover books, insights, and more — all in one place.
Learn more about Cryptology And Information Theory Data Structures with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “cryptology-and-information-theory-data-structures”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Algorithmic learning in a random world
By Vladimir Vovk, Alex Gammerman and Glenn Shafer

“Algorithmic learning in a random world” Metadata:
- Title: ➤ Algorithmic learning in a random world
- Authors: Vladimir VovkAlex GammermanGlenn Shafer
- Language: English
- Number of Pages: Median: 332
- Publisher: ➤ Springer International Publishing AG - Springer
- Publish Date: 2005 - 2010 - 2022 - 2023
“Algorithmic learning in a random world” Subjects and Themes:
- Subjects: ➤ Stochastic processes - Algorithms - Prediction theory - Computer science - Data structures (Computer science) - Artificial intelligence - Mathematical statistics - Artificial Intelligence (incl. Robotics) - Statistics and Computing/Statistics Programs - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: ➤ OL28133915M - OL37088302M - OL7442315M - OL51664545M - OL50633515M - OL38333329M
- Online Computer Library Center (OCLC) ID: 57579438
- Library of Congress Control Number (LCCN): 2005042556
- All ISBNs: ➤ 9780387001524 - 9783031066481 - 9783031066498 - 9780387250618 - 3031066480 - 9783031066511 - 3031066499 - 1441934715 - 0387250611 - 3031066510 - 0387001522 - 9781441934710
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Algorithmic learning in a random world at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Introduction to Public Key Infrastructures
By Johannes A. Buchmann, Evangelos Karatsiolis and Alexander Wiesmaier

“Introduction to Public Key Infrastructures” Metadata:
- Title: ➤ Introduction to Public Key Infrastructures
- Authors: Johannes A. BuchmannEvangelos KaratsiolisAlexander Wiesmaier
- Language: English
- Number of Pages: Median: 209
- Publisher: ➤ Springer Berlin / Heidelberg - Springer
- Publish Date: 2013 - 2016
“Introduction to Public Key Infrastructures” Subjects and Themes:
- Subjects: ➤ Data protection - Data structures (computer science) - Computer science - Cryptology and Information Theory Data Structures - Systems and Data Security - E-Commerce/e-business - Security Science and Technology
Edition Identifiers:
- The Open Library ID: OL37420046M - OL27949511M - OL30620493M
- All ISBNs: ➤ 3642406564 - 9783642406560 - 9783642406577 - 3662524503 - 3642406572 - 9783662524503
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Public Key Infrastructures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Engineering Secure Software and Systems
By Jan Jürjens

“Engineering Secure Software and Systems” Metadata:
- Title: ➤ Engineering Secure Software and Systems
- Author: Jan Jürjens
- Language: English
- Number of Pages: Median: 244
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2013 - 2014
- Publish Location: Berlin, Heidelberg
“Engineering Secure Software and Systems” Subjects and Themes:
- Subjects: ➤ Models and Principles - Software Engineering/Programming and Operating Systems - Cryptology and Information Theory Data Structures - Software engineering - Data structures (Computer science) - Math Applications in Computer Science - Computer Communication Networks - Data Encryption - Computer science - Data encryption (Computer science) - Computer security - Congresses - Computer networks - Security measures - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL37180274M - OL28305681M - OL28093176M - OL27996989M - OL27036423M
- Library of Congress Control Number (LCCN): 2013930843
- All ISBNs: ➤ 3642365647 - 3642365620 - 3642365639 - 9783642365645 - 9783642365638 - 3319048961 - 331904897X - 9783319048970 - 9783642365621 - 9783319048963
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Engineering Secure Software and Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Introduction to Biometrics
By Anil K. Jain

“Introduction to Biometrics” Metadata:
- Title: Introduction to Biometrics
- Author: Anil K. Jain
- Language: English
- Number of Pages: Median: 328
- Publisher: ➤ Springer - Springer International Publishing AG - Springer Science+Business Media, LLC
- Publish Date: 2011 - 2014 - 2024
- Publish Location: Boston, MA
“Introduction to Biometrics” Subjects and Themes:
- Subjects: ➤ Computer Imaging, Vision, Pattern Recognition and Graphics - Pattern perception - Image Processing and Computer Vision - Cryptology and Information Theory Data Structures - Optical pattern recognition - Multimedia systems - Data structures (Computer science) - Computer vision - Data Encryption - Computer science - Data encryption (Computer science) - Biometry - Pattern recognition systems - Anthropometry - Biometric identification
Edition Identifiers:
- The Open Library ID: OL51797641M - OL27980030M - OL25548019M - OL51810512M
- Library of Congress Control Number (LCCN): 2011942231
- All ISBNs: ➤ 9780387773261 - 9783031616747 - 3031643941 - 9780387773254 - 1489985433 - 0387773258 - 9781489985439 - 303161674X - 9783031643941 - 0387773266
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Biometrics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Multivariate public key cryptosystems
By Jintai Ding, Jason E. Gower and Dieter Schmidt

“Multivariate public key cryptosystems” Metadata:
- Title: ➤ Multivariate public key cryptosystems
- Authors: Jintai DingJason E. GowerDieter Schmidt
- Language: English
- Number of Pages: Median: 260
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2006 - 2008 - 2010 - 2020
“Multivariate public key cryptosystems” Subjects and Themes:
- Subjects: ➤ Computers - Data encryption (Computer science) - Computer security - Access control - Cryptography - Information theory - Computers, access control - Quantum theory - Computer science - Data structures (Computer science) - Coding theory - Cryptology and Information Theory Data Structures - Data Encryption - Coding and Information Theory - Data Structures - Mathematics of Computing - Theory of Computation
Edition Identifiers:
- The Open Library ID: OL35750675M - OL34371060M - OL29511683M - OL28240116M - OL7445386M
- Online Computer Library Center (OCLC) ID: 65764987
- Library of Congress Control Number (LCCN): 2006285715
- All ISBNs: ➤ 1071609858 - 9780387322292 - 0387369465 - 1441940774 - 9780387512167 - 9781441940773 - 0387322299 - 0387512160 - 9780387369464 - 9781071609859
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Multivariate public key cryptosystems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Classification and data analysis
By Classification Group of SIS. Meeting, Italy) Classification Group of Sis Meeting (1997 Pescara and Otto Opitz

“Classification and data analysis” Metadata:
- Title: ➤ Classification and data analysis
- Authors: ➤ Classification Group of SIS. MeetingItaly) Classification Group of Sis Meeting (1997 PescaraOtto Opitz
- Language: English
- Number of Pages: Median: 378
- Publisher: ➤ Springer - Springer London, Limited - Springer-Verlag Telos - Island Press
- Publish Date: 1999 - 2012
- Publish Location: New York - London
“Classification and data analysis” Subjects and Themes:
- Subjects: ➤ Congresses - Information storage and retrieval systems - Statistics - Classification - Economics - Data structures (Computer science) - Data capture & analysis - Probability & statistics - Mathematical Statistics - Mathematics - Science/Mathematics - Probability & Statistics - General - Economics - General - Information storage and retrie - Data transmission systems - Economics/Management Science - Statistics for Business/Economics/Mathematical Finance/Insurance - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL50682946M - OL37230712M - OL9062918M - OL22639637M - OL32762M
- Online Computer Library Center (OCLC) ID: 504536678
- Library of Congress Control Number (LCCN): 99014729
- All ISBNs: ➤ 9783642601262 - 9783642601279 - 9783540656333 - 3642601278 - 364260126X - 3540656332
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Classification and data analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Network Science and Cybersecurity
By Robinson E. Pino

“Network Science and Cybersecurity” Metadata:
- Title: ➤ Network Science and Cybersecurity
- Author: Robinson E. Pino
- Language: English
- Number of Pages: Median: 285
- Publisher: ➤ Springer - Springer Science+Business Media - Springer London, Limited
- Publish Date: 2013 - 2014 - 2015
- Publish Location: New York
“Network Science and Cybersecurity” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Internet - Computer security - Computer networks - Data protection - Internet, security measures - Computer science - Data encryption (Computer science) - Data structures (Computer science) - Computer Communication Networks - Telecommunication - Systems and Data Security - Data Encryption - Cryptology and Information Theory Data Structures - Networks Communications Engineering
Edition Identifiers:
- The Open Library ID: OL31013163M - OL35499841M - OL29308731M - OL27968752M
- Online Computer Library Center (OCLC) ID: 835373463
- Library of Congress Control Number (LCCN): 2013942470
- All ISBNs: ➤ 1461475961 - 9781489990655 - 9781461475989 - 9781461475965 - 1489990658 - 1461475988 - 146147597X - 9781461475972
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network Science and Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
By Dirk Bouwmeester, Artur K. Ekert and Anton Zeilinger

“The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation” Metadata:
- Title: ➤ The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
- Authors: Dirk BouwmeesterArtur K. EkertAnton Zeilinger
- Number of Pages: Median: 314
- Publisher: Springer
- Publish Date: 2013
“The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation” Subjects and Themes:
- Subjects: ➤ Quantum optics - Quantum theory - Physics - Data structures (Computer science) - Telecommunication - Photonics Laser Technology - Networks Communications Engineering - Cryptology and Information Theory Data Structures - Spintronics Quantum Information Technology
Edition Identifiers:
- The Open Library ID: OL26744533M
- All ISBNs: 9783662042090 - 3662042096
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Digital Communication
By Christoph Meinel and Harald Sack

“Digital Communication” Metadata:
- Title: Digital Communication
- Authors: Christoph MeinelHarald Sack
- Language: English
- Number of Pages: Median: 410
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2014 - 2016
“Digital Communication” Subjects and Themes:
- Subjects: ➤ Digital communications - Multimedia systems - Information Systems Applications (incl. Internet) - Computer science - Data structures (Computer science) - Computer network architectures - Coding theory - Computer Systems Organization and Communication Networks - Cryptology and Information Theory Data Structures - History of Computing - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: OL28123469M - OL37192755M - OL27985881M
- All ISBNs: ➤ 3642543316 - 9783642543302 - 3662515008 - 3642543308 - 9783662515006 - 9783642543319
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Communication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10The Crossing of Heaven
By Karl Gustafson

“The Crossing of Heaven” Metadata:
- Title: The Crossing of Heaven
- Author: Karl Gustafson
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Springer Berlin Heidelberg - Springer Berlin / Heidelberg - Springer
- Publish Date: 2012 - 2014
- Publish Location: Berlin, Heidelberg
“The Crossing of Heaven” Subjects and Themes:
- Subjects: ➤ History of Mathematical Sciences - Quantitative Finance - Finance - Data structures (Computer science) - Applications of Mathematics - Mathematics, general - Cryptology and Information Theory Data Structures - Computer science - Mathematics - Computational Mathematics and Numerical Analysis - Mathematicians, biography - Computer scientists - Mathematicians - Biography
Edition Identifiers:
- The Open Library ID: OL27028129M - OL35784988M - OL30536146M - OL27999144M
- Online Computer Library Center (OCLC) ID: 733249940
- Library of Congress Control Number (LCCN): 2011942157
- All ISBNs: ➤ 3642225586 - 3642441424 - 9783642225574 - 3642225578 - 9783642225581 - 3642225594 - 9783642441424 - 9783642225598
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Crossing of Heaven at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Physically Unclonable Functions
By Roel Maes

“Physically Unclonable Functions” Metadata:
- Title: ➤ Physically Unclonable Functions
- Author: Roel Maes
- Language: English
- Number of Pages: Median: 210
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer
- Publish Date: 2013 - 2016
“Physically Unclonable Functions” Subjects and Themes:
- Subjects: ➤ Data structures (computer science) - Computer science - Electric engineering - Information theory - Electrical - Engineering (general) - Professional, career & trade -> computer science -> information theory - Professional, career & trade -> engineering -> electrical & electronics engineering - Professional, career & trade -> engineering -> general engineering - Sci15009 - Sct24000 - Scp31080 - Suco11645 - 2972 - 2886 - 3382 - Electrical engineering - Computer engineering - Cryptology and Information Theory Data Structures - Security Science and Technology
Edition Identifiers:
- The Open Library ID: OL28036913M - OL35795699M - OL36204063M
- All ISBNs: ➤ 3642413943 - 9783642413940 - 3642413951 - 3662514524 - 9783662514528 - 9783642413957
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Physically Unclonable Functions at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Finite Sample Analysis in Quantum Estimation
By Takanori Sugiyama

“Finite Sample Analysis in Quantum Estimation” Metadata:
- Title: ➤ Finite Sample Analysis in Quantum Estimation
- Author: Takanori Sugiyama
- Language: English
- Number of Pages: Median: 132
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2014 - 2016
“Finite Sample Analysis in Quantum Estimation” Subjects and Themes:
- Subjects: ➤ Quantum statistics - Quantum theory - Quantum optics - Physics - Data structures (Computer science) - Spintronics Quantum Information Technology - Measurement Science and Instrumentation - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL27997149M - OL36206616M - OL30532190M - OL34378319M
- All ISBNs: ➤ 4431547762 - 4431547770 - 4431561838 - 9784431547761 - 9784431547778 - 9784431547785 - 4431547789 - 9784431561835
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Finite Sample Analysis in Quantum Estimation at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Moving Target Defense II
By Sushil Jajodia

“Moving Target Defense II” Metadata:
- Title: Moving Target Defense II
- Author: Sushil Jajodia
- Language: English
- Number of Pages: Median: 210
- Publisher: ➤ Springer New York - Imprint: Springer - Brand: Springer - Springer
- Publish Date: 2012 - 2013 - 2014
- Publish Location: New York, NY
“Moving Target Defense II” Subjects and Themes:
- Subjects: ➤ Cryptology and Information Theory Data Structures - Telecommunication - Systems and Data Security - Computer networks - Data structures (Computer science) - Networks Communications Engineering - Data Encryption - Computer science - Data protection - Data encryption (Computer science) - Computer networks, security measures - Computer security - Game theory - Security measures - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL28131430M - OL27076028M - OL27999797M - OL28158597M
- Library of Congress Control Number (LCCN): 2012540870
- All ISBNs: ➤ 9781461454175 - 9781461454151 - 1461454158 - 1461454174 - 9781461454168 - 1489993169 - 1461454166 - 9781489993168
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Moving Target Defense II at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Concise Guide to Databases Undergraduate Topics in Computer Science
By Peter Lake

“Concise Guide to Databases Undergraduate Topics in Computer Science” Metadata:
- Title: ➤ Concise Guide to Databases Undergraduate Topics in Computer Science
- Author: Peter Lake
- Number of Pages: Median: 307
- Publisher: Springer London Ltd
- Publish Date: 2013
“Concise Guide to Databases Undergraduate Topics in Computer Science” Subjects and Themes:
- Subjects: ➤ Database management - Information retrieval - Information organization - Computer science - Data structures (Computer science) - Software engineering - Information storage and retrieval systems - Cryptology and Information Theory Data Structures - Software Engineering/Programming and Operating Systems
Edition Identifiers:
- The Open Library ID: OL26152061M
- All ISBNs: 9781447156000 - 1447156005
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Concise Guide to Databases Undergraduate Topics in Computer Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Applied Information Security
By David Basin

“Applied Information Security” Metadata:
- Title: Applied Information Security
- Author: David Basin
- Language: English
- Number of Pages: Median: 216
- Publisher: ➤ Springer-Verlag Berlin Heidelberg - Springer
- Publish Date: 2011 - 2013
- Publish Location: Berlin, Heidelberg
“Applied Information Security” Subjects and Themes:
- Subjects: ➤ Data protection - Information Systems - Computer science - Data structures (Computer science) - Management information systems - Computer networks - Security measures - Data encryption (Computer science) - Computer security - Computer networks, security measures - Business Information Systems - Innovation/Technology Management - Management of Computing and Information Systems - Cryptology and Information Theory Data Structures - Systems and Data Security
Edition Identifiers:
- The Open Library ID: OL28007491M - OL25547276M
- Library of Congress Control Number (LCCN): 2011941698
- All ISBNs: ➤ 9783642244742 - 3642436323 - 9783642436321 - 3642244742 - 9783642244735 - 3642244734
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Applied Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Advances in data science and classification
By International Federation of Classification Societies. Conference, Alfredo Rizzi, Maurizio Vichi and Hans Hermann Bock

“Advances in data science and classification” Metadata:
- Title: ➤ Advances in data science and classification
- Authors: ➤ International Federation of Classification Societies. ConferenceAlfredo RizziMaurizio VichiHans Hermann Bock
- Language: English
- Number of Pages: Median: 677
- Publisher: ➤ Springer - Springer London, Limited - Springer-Verlag Telos - Island Press
- Publish Date: 1998 - 1999 - 2013
- Publish Location: New York
“Advances in data science and classification” Subjects and Themes:
- Subjects: ➤ Congresses - Cluster analysis - Pattern perception - Economics - Statistics - Data structures (Computer science) - Applied mathematics - Data capture & analysis - Databases & data structures - Science/Mathematics - Mathematics - Multivariate Analysis - Pattern Recognition - Probability & Statistics - General - Economics - General - Economics/Management Science - Statistics, general - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL50692010M - OL37231551M - OL9062647M - OL373865M
- Online Computer Library Center (OCLC) ID: 504455924
- Library of Congress Control Number (LCCN): 98035573
- All ISBNs: ➤ 9783642722530 - 3642722547 - 9783642722547 - 3540646418 - 9783540646419 - 3642722539
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in data science and classification at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Theory and Applications of Models of Computation
By Manindra Agrawal

“Theory and Applications of Models of Computation” Metadata:
- Title: ➤ Theory and Applications of Models of Computation
- Author: Manindra Agrawal
- Language: English
- Number of Pages: Median: 532
- Publisher: ➤ Springer International Publishing AG - Springer Berlin Heidelberg - Springer - Springer London, Limited
- Publish Date: 2012 - 2014
- Publish Location: Berlin, Heidelberg
“Theory and Applications of Models of Computation” Subjects and Themes:
- Subjects: ➤ Mathematical Logic and Formal Languages - Cryptology and Information Theory Data Structures - Information theory - Computer software - Algorithm Analysis and Problem Complexity - Logic design - Logics and Meanings of Programs - Data structures (Computer science) - Theory of Computation - Mathematics of Computing - Computer science
Edition Identifiers:
- The Open Library ID: OL35805680M - OL34499766M - OL29310820M - OL27091697M
- All ISBNs: ➤ 3319060899 - 3642299520 - 9783319060880 - 3642299539 - 9783642299537 - 9783642299520 - 3319060880 - 9783319060897
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Theory and Applications of Models of Computation at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Fundamentals of Quantum Information
By Dieter Heiss

“Fundamentals of Quantum Information” Metadata:
- Title: ➤ Fundamentals of Quantum Information
- Author: Dieter Heiss
- Language: English
- Number of Pages: Median: 273
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2003 - 2008 - 2010
“Fundamentals of Quantum Information” Subjects and Themes:
- Subjects: ➤ Quantum theory - Quantum computers - Physics - Data structures (Computer science) - Mathematics - Quantum computing - Information and Physics Quantum Computing - Circuits Information and Communication - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL9057677M - OL28112637M - OL35749402M
- Online Computer Library Center (OCLC) ID: 506097411
- Library of Congress Control Number (LCCN): 2002021847
- All ISBNs: ➤ 3540433678 - 3642077722 - 9783540433675 - 3540459332 - 9783642077722 - 9783540459330
First Setence:
"Abstract. I present a tutorial review of the behavior of a simple 2-state quantum system ("qubit") in interaction with a dissipative environment, with particular attention to the questions of when we can regard the system as effectively isolated and of "true" versus "false" decoherence."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Fundamentals of Quantum Information at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Applied Algorithms
By Prosenjit Gupta and Christos Zaroliagis

“Applied Algorithms” Metadata:
- Title: Applied Algorithms
- Authors: Prosenjit GuptaChristos Zaroliagis
- Language: English
- Number of Pages: Median: 311
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2013 - 2014 - 2025
“Applied Algorithms” Subjects and Themes:
- Subjects: ➤ Algorithms - Information Systems Applications (incl. Internet) - Artificial Intelligence (incl. Robotics) - Computer science - Data structures (Computer science) - Computer Communication Networks - Computer software - Artificial intelligence - Algorithm Analysis and Problem Complexity - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL35812064M - OL28735482M - OL57742109M
- All ISBNs: ➤ 9783319041254 - 9783319041261 - 3031845420 - 3319041266 - 9783031845420 - 3319041258
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Applied Algorithms at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20The Austin protocol compiler
By Tommy M. McGuire

“The Austin protocol compiler” Metadata:
- Title: The Austin protocol compiler
- Author: Tommy M. McGuire
- Language: English
- Number of Pages: Median: 141
- Publisher: ➤ Springer Science+Business Media - Springer London, Limited - Springer
- Publish Date: 2004 - 2006 - 2010
- Publish Location: New York
“The Austin protocol compiler” Subjects and Themes:
- Subjects: ➤ Communications software - Compilers (Computer programs) - Computer network protocols - Computer programs - Computer science - Data transmission systems - Computer network architectures - Computer Communication Networks - Data structures (Computer science) - Information systems - Information Systems and Communication Service - Information Systems Applications (incl.Internet) - Cryptology and Information Theory Data Structures - Input/Output and Data Communications - Computer Systems Organization and Communication Networks
Edition Identifiers:
- The Open Library ID: OL37090167M - OL3309898M - OL34370505M
- Online Computer Library Center (OCLC) ID: 56481413
- Library of Congress Control Number (LCCN): 2004058949
- All ISBNs: ➤ 9780387232287 - 9781441935885 - 9780387232270 - 0387232273 - 1441935886 - 0387232281
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Austin protocol compiler at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Location Privacy Protection in Mobile Networks
By Xinxin Liu and Xiaolin Li

“Location Privacy Protection in Mobile Networks” Metadata:
- Title: ➤ Location Privacy Protection in Mobile Networks
- Authors: Xinxin LiuXiaolin Li
- Language: English
- Number of Pages: Median: 88
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2013
“Location Privacy Protection in Mobile Networks” Subjects and Themes:
- Subjects: ➤ Data structures (computer science) - Computer storage devices - Computer security - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Telecommunication - Systems and Data Security - Data Encryption - Networks Communications Engineering - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL28019345M - OL30548017M - OL37179906M
- All ISBNs: ➤ 1461490731 - 9781461490739 - 1461490758 - 9781461490746 - 146149074X - 9781461490753
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Location Privacy Protection in Mobile Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Digital Forensics and Watermarking
By Yun Q. Shi

“Digital Forensics and Watermarking” Metadata:
- Title: ➤ Digital Forensics and Watermarking
- Author: Yun Q. Shi
- Language: English
- Publisher: ➤ Imprint: Springer - Springer Berlin Heidelberg - Springer London, Limited
- Publish Date: 2012 - 2013
- Publish Location: Berlin, Heidelberg
“Digital Forensics and Watermarking” Subjects and Themes:
- Subjects: ➤ Image Processing and Computer Vision - Computer graphics - Information organization - Information storage and retrieval systems - Data structures (Computer science) - Information retrieval - Computer vision - Cryptology and Information Theory Data Structures - Data Encryption - Computer science - Data encryption (Computer science) - Congresses
Edition Identifiers:
- The Open Library ID: OL36215027M - OL27032400M
- Library of Congress Control Number (LCCN): 2012943038
- All ISBNs: 9783642400995 - 9783642322051 - 3642322050 - 364240099X
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Forensics and Watermarking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Economics of Information Security and Privacy III
By Bruce Schneier

“Economics of Information Security and Privacy III” Metadata:
- Title: ➤ Economics of Information Security and Privacy III
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 293
- Publisher: ➤ Springer New York - Springer - Imprint: Springer
- Publish Date: 2013 - 2014
- Publish Location: New York, NY
“Economics of Information Security and Privacy III” Subjects and Themes:
- Subjects: ➤ Economics - Systems and Data Security - Computer Systems Organization and Communication Networks - Computer networks - Computer network architectures - Data structures (Computer science) - Economics/Management Science, general - Cryptology and Information Theory Data Structures - Computer science - Data protection - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL27033882M - OL28064771M
- All ISBNs: 9781493900367 - 1461419816 - 1493900366 - 9781461419815
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Economics of Information Security and Privacy III at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Rainbow Connections of Graphs
By Xueliang Li

“Rainbow Connections of Graphs” Metadata:
- Title: Rainbow Connections of Graphs
- Author: Xueliang Li
- Language: English
- Number of Pages: Median: 112
- Publisher: Springer US - Springer
- Publish Date: 2012
- Publish Location: Boston, MA
“Rainbow Connections of Graphs” Subjects and Themes:
- Subjects: ➤ Mathematics - Cryptology and Information Theory Data Structures - Graph theory - Data structures (Computer science) - Number theory
Edition Identifiers:
- The Open Library ID: OL27084369M - OL28987782M
- All ISBNs: 9781461431190 - 9781461431206 - 1461431204 - 1461431190
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Rainbow Connections of Graphs at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Trustworthy Reconfigurable Systems
By Thomas Feller

“Trustworthy Reconfigurable Systems” Metadata:
- Title: ➤ Trustworthy Reconfigurable Systems
- Author: Thomas Feller
- Language: English
- Number of Pages: Median: 233
- Publisher: ➤ Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH - Springer Vieweg
- Publish Date: 2014
“Trustworthy Reconfigurable Systems” Subjects and Themes:
- Subjects: ➤ Computer input-output equipment - Computers - Computer science - Data structures (Computer science) - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL27965527M - OL27998212M - OL37414202M
- All ISBNs: ➤ 9783658070052 - 9783658070069 - 3658070056 - 3658070048 - 9783658070045 - 3658070064
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trustworthy Reconfigurable Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Cryptographic Protocol
By Ling Dong and Kefei Chen

“Cryptographic Protocol” Metadata:
- Title: Cryptographic Protocol
- Authors: Ling DongKefei Chen
- Language: English
- Number of Pages: Median: 319
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2012
“Cryptographic Protocol” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Computer network protocols - Computer networks, security measures - Computer networks - Security measures - Data encryption (Computer science) - Cryptographie - Computer science - Data structures (Computer science) - Computer network architectures - Data protection - Computer Systems Organization and Communication Networks - Systems and Data Security - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL37146150M - OL27979794M - OL27965715M
- Library of Congress Control Number (LCCN): 2011937024
- All ISBNs: ➤ 3642240720 - 9783642240744 - 9783642240737 - 3642240739 - 9783642240720 - 3642240747
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cryptographic Protocol at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Code Breaking in the Pacific
By Peter Donovan and Mack, John

“Code Breaking in the Pacific” Metadata:
- Title: Code Breaking in the Pacific
- Authors: Peter DonovanMack, John
- Language: English
- Number of Pages: Median: 415
- Publisher: Springer
- Publish Date: 2014 - 2016
“Code Breaking in the Pacific” Subjects and Themes:
- Subjects: ➤ Cryptography - World war, 1939-1945, pacific area - Computer science - Data encryption (Computer science) - Data structures (Computer science) - Data protection - Coding theory - Cryptology and Information Theory Data Structures - Data Encryption - Coding and Information Theory - Math Applications in Computer Science - History of Computing - Systems and Data Security
Edition Identifiers:
- The Open Library ID: OL28165853M - OL37414266M - OL28736218M
- All ISBNs: ➤ 9783319082776 - 9783319359823 - 3319082787 - 9783319082783 - 3319082779 - 3319359827
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Code Breaking in the Pacific at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Biometrics in the New World
By Julian Ashbourn

“Biometrics in the New World” Metadata:
- Title: Biometrics in the New World
- Author: Julian Ashbourn
- Language: English
- Number of Pages: Median: 259
- Publisher: ➤ Springer - Springer International Publishing AG
- Publish Date: 2014 - 2016
“Biometrics in the New World” Subjects and Themes:
- Subjects: ➤ Anthropometry - Biometric identification - Identification - Automation - Computer science - Data structures (Computer science) - Software engineering - Biometrics - Social sciences - Data processing - Special Purpose and Application-Based Systems - Cryptology and Information Theory Data Structures - Software Engineering/Programming and Operating Systems - Computer Appl. in Social and Behavioral Sciences - Computers and Society
Edition Identifiers:
- The Open Library ID: OL28309217M - OL34877283M - OL28135622M
- Library of Congress Control Number (LCCN): 2014930098
- All ISBNs: ➤ 9783319041582 - 9783319041599 - 9783319346878 - 3319041584 - 3319041592 - 3319346873
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Biometrics in the New World at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Authentication in Insecure Environments
By Sebastian Pape

“Authentication in Insecure Environments” Metadata:
- Title: ➤ Authentication in Insecure Environments
- Author: Sebastian Pape
- Language: English
- Number of Pages: Median: 380
- Publisher: ➤ Springer Fachmedien Wiesbaden GmbH - Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH - Springer Vieweg
- Publish Date: 2014
“Authentication in Insecure Environments” Subjects and Themes:
- Subjects: ➤ Computer science - Data structures (Computer science) - Information systems - Cryptology and Information Theory Data Structures - Information Systems and Communication Service
Edition Identifiers:
- The Open Library ID: OL37186132M - OL28033721M - OL37194983M
- All ISBNs: ➤ 9783658071172 - 3658071176 - 9783658071165 - 9783658071158 - 3658071168 - 365807115X
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Authentication in Insecure Environments at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Secure Smart Embedded Devices, Platforms and Applications
By Konstantinos Markantonakis and Keith Mayes

“Secure Smart Embedded Devices, Platforms and Applications” Metadata:
- Title: ➤ Secure Smart Embedded Devices, Platforms and Applications
- Authors: Konstantinos MarkantonakisKeith Mayes
- Language: English
- Number of Pages: Median: 609
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2013 - 2016
“Secure Smart Embedded Devices, Platforms and Applications” Subjects and Themes:
- Subjects: ➤ Smart cards - Computer networks, security measures - Computer security - Embedded computer systems - Computer networks - Security measures - Information Systems Applications (incl. Internet) - Computer science - Data structures (Computer science) - Computer network architectures - Data protection - Telecommunication - Systems and Data Security - Cryptology and Information Theory Data Structures - Computer Systems Organization and Communication Networks - Networks Communications Engineering
Edition Identifiers:
- The Open Library ID: OL35499796M - OL28133422M - OL28536248M
- Library of Congress Control Number (LCCN): 2013939824
- All ISBNs: ➤ 1461479150 - 1493951920 - 1461479142 - 9781461479154 - 9781461479147 - 9781493951925
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure Smart Embedded Devices, Platforms and Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Cryptography and Coding
By Martijn Stam

“Cryptography and Coding” Metadata:
- Title: Cryptography and Coding
- Author: Martijn Stam
- Language: English
- Number of Pages: Median: 377
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2013
“Cryptography and Coding” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Cryptography - Computer science - Data structures (Computer science) - Data protection - Coding theory - Computer software - Computational complexity - Data Encryption - Coding and Information Theory - Algorithm Analysis and Problem Complexity - Cryptology and Information Theory Data Structures - Systems and Data Security - Discrete Mathematics in Computer Science
Edition Identifiers:
- The Open Library ID: OL27979718M - OL27949810M - OL34520789M
- All ISBNs: ➤ 3642452396 - 9783642452406 - 3642452388 - 9783642452390 - 364245240X - 9783642452383
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cryptography and Coding at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Introduction to Quantum Information Science
By Masahito Hayashi, Satoshi Ishizaka, Akinori Kawachi, Gen Kimura and Tomohiro Ogawa

“Introduction to Quantum Information Science” Metadata:
- Title: ➤ Introduction to Quantum Information Science
- Authors: Masahito HayashiSatoshi IshizakaAkinori KawachiGen KimuraTomohiro Ogawa
- Language: English
- Number of Pages: Median: 332
- Publisher: ➤ Springer Berlin / Heidelberg - Springer - Springer London, Limited
- Publish Date: 2014 - 2016
“Introduction to Quantum Information Science” Subjects and Themes:
- Subjects: ➤ Quantum theory - Quantum computers - Information theory - Physics - Data structures (Computer science) - Mathematics - Spintronics Quantum Information Technology - Quantum Computing - Mathematical and Computational Physics Theoretical - Cryptology and Information Theory Data Structures - Circuits Information and Communication
Edition Identifiers:
- The Open Library ID: OL34522456M - OL28270140M - OL34541527M
- All ISBNs: ➤ 3662435012 - 3662435020 - 9783662435014 - 9783662435021 - 9783662511251 - 3662511258
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Quantum Information Science at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Algebraic Aspects of Cryptography
By A. J. Menezes, Yi-Hong Wu, R. J. Zuccherato and Neal Koblitz
“Algebraic Aspects of Cryptography” Metadata:
- Title: ➤ Algebraic Aspects of Cryptography
- Authors: A. J. MenezesYi-Hong WuR. J. ZuccheratoNeal Koblitz
- Language: English
- Number of Pages: Median: 206
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Island Press
- Publish Date: 1998 - 2010 - 2012
“Algebraic Aspects of Cryptography” Subjects and Themes:
- Subjects: ➤ Coding theory - Combinatorial analysis - Number theory - Mathematics - Data encryption (Computer science) - Data structures (Computer science) - Cryptology and Information Theory Data Structures - Data Encryption
Edition Identifiers:
- The Open Library ID: OL50677324M - OL35808490M - OL35757031M
- All ISBNs: ➤ 9783662036433 - 3662036428 - 3642083323 - 9783662036426 - 9783642083327 - 3662036436
Author's Alternative Names:
"KOBLITZ NEAL" and "Neal I. Koblitz"Access and General Info:
- First Year Published: 1998
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Algebraic Aspects of Cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Foundations of Computer Security
By David Salomon

“Foundations of Computer Security” Metadata:
- Title: ➤ Foundations of Computer Security
- Author: David Salomon
- Language: English
- Number of Pages: Median: 369
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2005 - 2006 - 2010
“Foundations of Computer Security” Subjects and Themes:
- Subjects: ➤ Computer crimes - Computer security - Computer networks - Coding theory - Data encryption (Computer science) - Data structures (Computer science) - Information storage and retrieval systems - Computer science - Computer Communication Networks - Coding and Information Theory - Cryptology and Information Theory Data Structures - Data Encryption - Information Storage and Retrieval
Edition Identifiers:
- The Open Library ID: OL34371098M - OL8962517M - OL37118291M
- Library of Congress Control Number (LCCN): 2005932091
- All ISBNs: ➤ 1849965609 - 1846281938 - 1846283418 - 9781846281938 - 9781849965606 - 9781846283413
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Foundations of Computer Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35A classical introduction to cryptography
By Serge Vaudenay

“A classical introduction to cryptography” Metadata:
- Title: ➤ A classical introduction to cryptography
- Author: Serge Vaudenay
- Language: English
- Number of Pages: Median: 353
- Publisher: Springer
- Publish Date: 2005 - 2006 - 2010
- Publish Location: New York
“A classical introduction to cryptography” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Computer science - Data encryption (computer science) - Data structures (computer science) - Data transmission systems - Computer network architectures - Computer networks - Coding theory - Data encryption - Data structures, cryptology and information theory - Computer communication networks - Coding and information theory - Input/output and data communications - Computer systems organization and communication networks - Qa76.9.a25 - 005.82 - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL28049012M - OL7444800M - OL21700097M
- Online Computer Library Center (OCLC) ID: 61253969
- Library of Congress Control Number (LCCN): 2005051681
- All ISBNs: ➤ 9780387254647 - 1441937978 - 0387258809 - 9781441937971 - 9780387258805 - 0387254641
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find A classical introduction to cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Access control systems
By Messaoud Benantar

“Access control systems” Metadata:
- Title: Access control systems
- Author: Messaoud Benantar
- Language: English
- Number of Pages: Median: 261
- Publisher: ➤ Springer Science+Business Media - Springer
- Publish Date: 2005 - 2006 - 2010
- Publish Location: New York - New York, NY
“Access control systems” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Computers, access control - Computer networks, security measures - Computer science - Computer Communication Networks - Software engineering - Operating systems (Computers) - Data structures (Computer science) - Data encryption (Computer science) - Information systems - Operating Systems - Cryptology and Information Theory Data Structures - Data Encryption - Special Purpose and Application-Based Systems - Information Systems Applications (incl.Internet)
Edition Identifiers:
- The Open Library ID: OL36192322M - OL3426244M - OL22718931M
- Online Computer Library Center (OCLC) ID: 60767092
- Library of Congress Control Number (LCCN): 2005049984
- All ISBNs: ➤ 0387004459 - 1441934731 - 0387277161 - 9780387277165 - 9781441934734 - 9780387004457
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Access control systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Dynamic Secrets In Communication Security
By Weibo Gong

“Dynamic Secrets In Communication Security” Metadata:
- Title: ➤ Dynamic Secrets In Communication Security
- Author: Weibo Gong
- Language: English
- Number of Pages: Median: 142
- Publisher: ➤ Springer-Verlag New York Inc. - Springer - Springer London, Limited
- Publish Date: 2013 - 2015
“Dynamic Secrets In Communication Security” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (Computer science) - Cryptography - Telecommunication systems - Computer science - Data structures (Computer science) - Computer Communication Networks - Data protection - Telecommunication - Systems and Data Security - Data Encryption - Cryptology and Information Theory Data Structures - Networks Communications Engineering
Edition Identifiers:
- The Open Library ID: OL27973765M - OL26022594M - OL35497791M
- Library of Congress Control Number (LCCN): 2013942180
- All ISBNs: ➤ 1493902296 - 1461478308 - 1461478316 - 9781461478300 - 9781493902293 - 9781461478317
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Dynamic Secrets In Communication Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Quantum Chance : nonlocality, teleportation and other quantum marvels
By Nicolas Gisin and Alain Aspect

“Quantum Chance : nonlocality, teleportation and other quantum marvels” Metadata:
- Title: ➤ Quantum Chance : nonlocality, teleportation and other quantum marvels
- Authors: Nicolas GisinAlain Aspect
- Number of Pages: Median: 109
- Publisher: ➤ Springer International Publishing - Springer - Imprint: Copernicus
- Publish Date: 2014
“Quantum Chance : nonlocality, teleportation and other quantum marvels” Subjects and Themes:
- Subjects: ➤ Quantum field theory - Quantum theory - Physics - Data structures (Computer science) - History and Philosophical Foundations of Physics - Spintronics Quantum Information Technology - Cryptology and Information Theory Data Structures
Edition Identifiers:
- The Open Library ID: OL26404733M
- All ISBNs: 9783319054728 - 3319054724
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Quantum Chance : nonlocality, teleportation and other quantum marvels at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Algebraic aspects of the Advanced Encryption Standard
By Carlos Cid, Sean Murphy and Matthew Robshaw

“Algebraic aspects of the Advanced Encryption Standard” Metadata:
- Title: ➤ Algebraic aspects of the Advanced Encryption Standard
- Authors: Carlos CidSean MurphyMatthew Robshaw
- Language: English
- Number of Pages: Median: 148
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2006 - 2010
“Algebraic aspects of the Advanced Encryption Standard” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Standards - Computers - Access control - Computer security - Computer science - Data structures (Computer science) - Coding theory - Geometry, algebraic - Data Encryption - Cryptology and Information Theory Data Structures - Algebraic Geometry - Coding and Information Theory - Math Applications in Computer Science
Edition Identifiers:
- The Open Library ID: OL37105124M - OL34370624M - OL7444680M
- Online Computer Library Center (OCLC) ID: 71788357
- Library of Congress Control Number (LCCN): 2006929676
- All ISBNs: ➤ 1441937293 - 0387368426 - 9781441937292 - 0387243631 - 9780387243634 - 9780387368429
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Algebraic aspects of the Advanced Encryption Standard at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz
By Heinrich Kersten

“IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz” Metadata:
- Title: ➤ IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz
- Author: Heinrich Kersten
- Language: ger
- Number of Pages: Median: 267
- Publisher: ➤ Vieweg - Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbH - Springer Vieweg
- Publish Date: 2008 - 2013
- Publish Location: Wiesbaden
“IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz” Subjects and Themes:
- Subjects: ➤ ISO / IEC 27001 - Cryptology and Information Theory Data Structures - Computer science - Data structures (Computer science) - Data protection
Edition Identifiers:
- The Open Library ID: OL27064905M - OL37219915M - OL25560710M
- Online Computer Library Center (OCLC) ID: 846887178 - 213392422
- All ISBNs: ➤ 9783834801784 - 9783658017231 - 9783834894250 - 383480178X - 3658017236 - 3834894257 - 3658017244 - 9783658017248
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Concurrent Zero-Knowledge
By Alon Rosen

“Concurrent Zero-Knowledge” Metadata:
- Title: Concurrent Zero-Knowledge
- Author: Alon Rosen
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2006 - 2007 - 2010
“Concurrent Zero-Knowledge” Subjects and Themes:
- Subjects: ➤ Zero-knowledge proofs - Data encryption (Computer science) - Cryptography - Computer security - Computer science - Data structures (Computer science) - Information theory - Cryptology and Information Theory Data Structures - Theory of Computation
Edition Identifiers:
- The Open Library ID: OL37108694M - OL27976623M - OL9056381M
- Online Computer Library Center (OCLC) ID: 71747357
- Library of Congress Control Number (LCCN): 2006930742
- All ISBNs: ➤ 9783642069499 - 9783540329398 - 3540329390 - 3642069495 - 3540329382 - 9783540329381
First Setence:
"Zero-knowledge proofs, introduced by Goldwasser, Micali and Rackoff [72], are fascinating and extremely useful constructs."
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Concurrent Zero-Knowledge at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Cryptology and Network Security
By Josef Pieprzyk

“Cryptology and Network Security” Metadata:
- Title: ➤ Cryptology and Network Security
- Author: Josef Pieprzyk
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ Imprint: Springer - Springer - Springer Berlin / Heidelberg - Springer Berlin Heidelberg
- Publish Date: 2012
- Publish Location: Berlin, Heidelberg
“Cryptology and Network Security” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Computational complexity - Cryptology and Information Theory Data Structures - Discrete Mathematics in Computer Science - Systems and Data Security - Data protection - Computer Communication Networks - Coding theory - Data structures (Computer science) - Data Encryption - Coding and Information Theory - Computer science - Congresses - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL37157326M - OL28293337M - OL27028234M
- Library of Congress Control Number (LCCN): 2012953024
- All ISBNs: ➤ 9783642354045 - 364235405X - 3642354033 - 3642354041 - 9783642354052 - 9783642354038
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cryptology and Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Privacy-Preserving Machine Learning for Speech Processing
By Manas A. Pathak

“Privacy-Preserving Machine Learning for Speech Processing” Metadata:
- Title: ➤ Privacy-Preserving Machine Learning for Speech Processing
- Author: Manas A. Pathak
- Language: English
- Number of Pages: Median: 141
- Publisher: ➤ Imprint: Springer - Springer New York
- Publish Date: 2013 - 2014
- Publish Location: New York, NY
“Privacy-Preserving Machine Learning for Speech Processing” Subjects and Themes:
- Subjects: ➤ Cryptology and Information Theory Data Structures - Telecommunication - Engineering - Data structures (Computer science) - Networks Communications Engineering - Production of electric energy or power - Electrical Machines and Networks Power Electronics - Image and Speech Processing Signal - Speech processing systems - Automatic speech recognition - Machine learning - Computer security
Edition Identifiers:
- The Open Library ID: OL37195390M - OL27082692M
- All ISBNs: 9781489991201 - 9781461446392 - 1461446392 - 1489991204
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy-Preserving Machine Learning for Speech Processing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Privacy in Statistical Databases
By Josep Domingo-Ferrer

“Privacy in Statistical Databases” Metadata:
- Title: ➤ Privacy in Statistical Databases
- Author: Josep Domingo-Ferrer
- Language: English
- Number of Pages: Median: 378
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2012 - 2014
- Publish Location: Berlin, Heidelberg
“Privacy in Statistical Databases” Subjects and Themes:
- Subjects: ➤ Cryptology and Information Theory Data Structures - Systems and Data Security - Database management - Computer networks - Data structures (Computer science) - Data Structures - Data Encryption - Computer science - Data protection - Data encryption (Computer science) - Database security - Congresses - Statistics - Databases - Computer security - Statistics, data processing - Information systems - Computer Appl. in Administrative Data Processing - Computers and Society - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL28654620M - OL27982017M - OL27082695M
- Library of Congress Control Number (LCCN): 2012947345
- All ISBNs: ➤ 9783642336263 - 3319112562 - 9783642336270 - 3642336272 - 3642336264 - 9783319112565
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy in Statistical Databases at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Quality of protection
By Dieter Gollmann and Fabio Massacci

“Quality of protection” Metadata:
- Title: Quality of protection
- Authors: Dieter GollmannFabio Massacci
- Language: English
- Number of Pages: Median: 205
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2006 - 2008 - 2010
“Quality of protection” Subjects and Themes:
- Subjects: ➤ Computer networks - Quality control - Congresses - Computer security - Standards - Computer networks, security measures - Computer networks, congresses - Computer science - Computer Communication Networks - Software engineering - Data structures (Computer science) - Data encryption (Computer science) - Database management - Cryptology and Information Theory Data Structures - Data Encryption - Software Engineering/Programming and Operating Systems - Processor Architectures
Edition Identifiers:
- The Open Library ID: OL37108192M - OL28112643M - OL7445129M
- Online Computer Library Center (OCLC) ID: 62796284
- Library of Congress Control Number (LCCN): 2007273339
- All ISBNs: ➤ 9781441939654 - 9780387290164 - 0387365842 - 9780387365848 - 1441939652 - 0387290168
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Quality of protection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Quantum Attacks on Public-Key Cryptosystems
By Song Y. Yan

“Quantum Attacks on Public-Key Cryptosystems” Metadata:
- Title: ➤ Quantum Attacks on Public-Key Cryptosystems
- Author: Song Y. Yan
- Language: English
- Number of Pages: Median: 215
- Publisher: ➤ Springer - Springer US - Imprint: Springer
- Publish Date: 2013 - 2015
- Publish Location: Boston, MA
“Quantum Attacks on Public-Key Cryptosystems” Subjects and Themes:
- Subjects: ➤ Cryptology and Information Theory Data Structures - Algebra - Computer software - Symbolic and Algebraic Manipulation - Data structures (Computer science) - Algorithm Analysis and Problem Complexity - Computer Communication Networks - Data Encryption - Data encryption (Computer science) - Data processing - Mathematics of Computing - Computer science - Quantum computers - Computer security - Data structures (computer science)
Edition Identifiers:
- The Open Library ID: OL30560214M - OL29047513M - OL27084027M
- All ISBNs: ➤ 1489997792 - 1441977236 - 9781441977236 - 1441977228 - 9781441977229 - 9781489997791
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Quantum Attacks on Public-Key Cryptosystems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Information and self-organization
By H. Haken

“Information and self-organization” Metadata:
- Title: ➤ Information and self-organization
- Author: H. Haken
- Language: English
- Number of Pages: Median: 222
- Publisher: Springer-Verlag - Springer
- Publish Date: 1988 - 2000 - 2006
- Publish Location: New York - Berlin
“Information and self-organization” Subjects and Themes:
- Subjects: ➤ Entropy (Information theory) - Self-organizing systems - Neurosciences - Biomedical engineering - Physics - Quantum computers - Data structures (Computer science) - Information technology - Information theory - Information and Physics Quantum Computing - Cryptology and Information Theory Data Structures - Biophysics/Biomedical Physics - Complexity - Engineering - Quantum computing
Edition Identifiers:
- The Open Library ID: OL2403955M - OL31720M - OL17841335M
- Online Computer Library Center (OCLC) ID: 70268079 - 42296528 - 17300205
- Library of Congress Control Number (LCCN): 2006283902 - 87034552 - 2006926728 - 99012503
- All ISBNs: ➤ 9783540662860 - 3540662863 - 3540330216 - 0387186395 - 9780387186399 - 9783540330219
Access and General Info:
- First Year Published: 1988
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and self-organization at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Operational Semantics and Verification of Security Protocols
By Cas Cremers

“Operational Semantics and Verification of Security Protocols” Metadata:
- Title: ➤ Operational Semantics and Verification of Security Protocols
- Author: Cas Cremers
- Language: English
- Number of Pages: Median: 180
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2012 - 2014
- Publish Location: Berlin, Heidelberg
“Operational Semantics and Verification of Security Protocols” Subjects and Themes:
- Subjects: ➤ Software Engineering/Programming and Operating Systems - Cryptology and Information Theory Data Structures - Software engineering - Computer Systems Organization and Communication Networks - Computer network architectures - Data structures (Computer science) - Computer science - Computer networks, security measures - Computer network protocols
Edition Identifiers:
- The Open Library ID: OL28135085M - OL27078763M
- All ISBNs: 9783642430534 - 9783540786368 - 3642430538 - 3540786368
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Operational Semantics and Verification of Security Protocols at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Finite Fields and Applications
By Dieter Jungnickel

“Finite Fields and Applications” Metadata:
- Title: Finite Fields and Applications
- Author: Dieter Jungnickel
- Language: English
- Number of Pages: Median: 490
- Publisher: ➤ Springer Berlin / Heidelberg - Springer Berlin Heidelberg - Springer - Imprint - Island Press
- Publish Date: 2001 - 2012
- Publish Location: Berlin, Heidelberg
“Finite Fields and Applications” Subjects and Themes:
- Subjects: ➤ Algebra - Combinatorial analysis - Mathematics - Data encryption (Computer science) - Data structures (Computer science) - Computer science - Cryptology and Information Theory Data Structures - Computational Mathematics and Numerical Analysis - Data Encryption
Edition Identifiers:
- The Open Library ID: OL50679535M - OL37168724M - OL27038852M
- Online Computer Library Center (OCLC) ID: 840292278
- All ISBNs: ➤ 364256755X - 9783642567568 - 3642624987 - 3642567568 - 9783642624988 - 9783642567551
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Finite Fields and Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Information and Communications Security
By Tat Wing Chim

“Information and Communications Security” Metadata:
- Title: ➤ Information and Communications Security
- Author: Tat Wing Chim
- Language: English
- Number of Pages: Median: 522
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2012
- Publish Location: Berlin, Heidelberg
“Information and Communications Security” Subjects and Themes:
- Subjects: ➤ Cryptology and Information Theory Data Structures - Systems and Data Security - Computer networks - Computer software - Algorithm Analysis and Problem Complexity - Data encryption (Computer science) - Coding theory - Data structures (Computer science) - Data protection - Data Encryption - Coding and Information Theory - Computer science - Congresses - Security measures - Computer security - Telecommunication systems - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL30572724M - OL28002183M - OL27045407M
- Library of Congress Control Number (LCCN): 2012948707
- All ISBNs: ➤ 9783642341281 - 9783642341298 - 9783642341304 - 3642341306 - 3642341292 - 3642341284
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information and Communications Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.