Limit search to available items
60 results found. Sorted by relevance | date | title .
Result Page   
Save marked records Save all on page
KEYWORDS (1-50 of 60)
 Most relevant titles entries 1-22
1
Mark
  History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms
Dooley, John F., author.
Cham : Springer, 2018. -Access this resource online
2018
EBOOKS
2
Mark
  Introduction to cryptography with mathematical foundations and computer implementations
Stanoyevitch, Alexander.
Boca Raton, Fla. : Chapman & Hall/CRC, 2013.  
2013
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 268 S7  8 WEEK LOAN  AVAILABLE
3
Mark
  Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.  
2010
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 F3  8 WEEK LOAN  AVAILABLE
4
Mark
  Understanding cryptography a textbook for students and practitioners
Paar, Christof, 1963- author.
Berlin : Springer, [2010] -Access this resource online
2010
EBOOKS
5
Mark
  Elementary number theory, cryptography and codes
Baldoni, M. Welleda, 1949-
Berlin : Springer, c2009.  
c2009
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 241 B1  8 WEEK LOAN  DUE 09-05-24
6
Mark
  Introduction to modern cryptography
Katz, Jonathan, 1974-
Boca Raton, Fla. : Chapman & Hall/CRC, c2008.  
c2008
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 K2  8 WEEK LOAN  AVAILABLE
7
Mark
  Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.  
c2006
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 S7  8 WEEK LOAN  AVAILABLE
8
Mark
  Cryptography and public key infrastructure on the internet
Schmeh, Klaus, author.
Chichester : Wiley, c2003.  
c2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 S3  4 WEEK LOAN  AVAILABLE
9
Mark
  Introduction to cryptography.
Buchmann, Johannes.
New York : Springer-Verlag, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 268 B9  8 WEEK LOAN  AVAILABLE
10
Mark
  Designs, codes and cryptography.

London : Kluwer, 1997-2001.  
2001
PERIODICAL
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL basement journals  QA 1 D35  1997,v.10-12  7 DAYS  ASK at the Reading Room
 BJL basement journals  QA 1 D35  1998,v.13-15  7 DAYS  ASK at the Reading Room
 BJL basement journals  QA 1 D35  1999,v.16-18  7 DAYS  ASK at the Reading Room
Click to view copies/volumes at all libraries
11
Mark
  Cryptography decrypted
Mel, H. X., 1948- author.
Boston, Mass. : Addison-Wesley, 2001.  
2001
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 76.9 A25 M5  4 WEEK LOAN  AVAILABLE
12
Mark
  Coding theory and cryptography : the essentials

New York : Marcel Dekker, c2000.  
c2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 268 C6  8 WEEK LOAN  AVAILABLE
13
Mark
  Java cryptography.
Knudsen, Jonathan.
Cambridge : O'Reilly and Associates, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.82 KNU  4 WEEK LOAN  AVAILABLE
14
Mark
  Disappearing cryptography : being and nothingness on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5105.59 W3  8 WEEK LOAN  AVAILABLE
15
Mark
  Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.  
1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
 BJL 3rd Floor  QA 76.9 A25 S3  8 WEEK LOAN  AVAILABLE
16
Mark
  A course in number theory and cryptography.
Koblitz, Neal.
New York : Springer, 1994.  
1994
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA 241 K7  4 WEEK LOAN  AVAILABLE
17
Mark
  Geometries, codes and cryptography
International Centre for Mechanical Sciences.
Wien : Springer, 1990.  
1990
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 268 G3  8 WEEK LOAN  AVAILABLE
18
Mark
  Number theory and cryptography
London Mathematical Society.
Cambridge : Cambridge Unversity Press, 1990.  
1990
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 241 N9  8 WEEK LOAN  AVAILABLE
19
Mark
  Codes and cryptography.
Welsh, Dominic.
Oxford : Clarendon Press, 1988.  
1988
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 268 W4  8 WEEK LOAN  AVAILABLE
20
Mark
  Cryptography.
Konheim, Alan G., 1934-
New York : Wiley, 1981.  
1981
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  Z 103 K7  8 WEEK LOAN  AVAILABLE
21
Mark
  Cryptography, the science of secret writing.
Smith, Lawrence Dwight.
London : Allen & Unwin, 1944.  
1944
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  Z 103 S6  8 WEEK LOAN  AVAILABLE
22
Mark
  A new method of cryptography, humbly presented to the most serene Majesty of Charles the II. By Samu
Morland, Samuel, Sir, 1625-1695.
[London : s.n., 1666] -Access this resource online
1666
EBOOKS
 Highly relevant titles entries 23-26
23
Mark
  The mathematics of secrets : cryptography from Caesar ciphers to digital encryption
Holden, Joshua, 1970- author.
Princeton : Princeton University Press, [2017] -Access this resource online
2017
EBOOKS
24
Mark
  The physics of quantum information : quantum cryptography, quantum teleportation, quantum computatio

New York : Springer, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.889 P5  8 WEEK LOAN  AVAILABLE
25
Mark
  The limits of trust : cryptography, governments, and electronic commerce
Baker, Stewart A. (Stewart Abercrombie), 1947-
The Hague : Kluwer Law International, 1998.  
1998
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 2nd Floor  K 564 C6 B1  8 WEEK LOAN  AVAILABLE
26
Mark
  Number theory in science and communication : with applications in cryptography, physics, digital inf
Schroeder, Manfred Robert.
London : Springer-Verlag, 1990.  
1990
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 241 S3  8 WEEK LOAN  AVAILABLE
 Very relevant titles entries 27-60
27
Mark
  The ancient Egyptian Netherworld Books
Darnell, John Coleman, author, translator.
Atlanta : SBL Press, [2018] -Access this resource online
2018
EBOOKS
28
Mark
  Foundations of coding : compression, encryption, error correction
Dumas, Jean-Guillaume.
Hoboken, New Jersey : Wiley, [2015] -Access this resource online
2015
EBOOKS
29
Mark
  Fundamentals of information systems security
Kim, David (Information technology security consultant)
Burlington, Mass. : Jones & Bartlett Learning, c2014.  
c2014
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  QA76.9.A25 K536 2014  4 WEEK LOAN  AVAILABLE
30
Mark
  Introduction to computer and network security : navigating shades of gray
Brooks, Richard R.
London : CRC Press, 2013. -Access this resource online
2013
EBOOKS
31
Mark
  Principles of computer security CompTIA security+ and beyond (exam SY0-301)

New York : McGraw-Hill, c2012. -Access this resource online
c2012
EBOOKS
32
Mark
  The history of information security a comprehensive handbook

Amsterdam ; London : Elsevier, c2007. -Access this resource online
c2007
EBOOKS
33
Mark
  Decoding mathematics
Ball, Derek.
Derby : Association of Teachers of Mathematics, 2003.  
2003
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room 1st floor HDC  q QA 43 B1  4 WEEK LOAN  AVAILABLE
34
Mark
  Body of secrets : how America's NSA and Britain's GCHQ eavesdrop on the world.
Bamford, James.
London : Arrow, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  UB 256 U5 B1  8 WEEK LOAN  AVAILABLE
35
Mark
  The Battle of the Atlantic and signals intelligence : U-boat tracking papers, 1941-1947

Aldershot : Ashgate for the Navy Records Society, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  VA 452 N3(144)  8 WEEK LOAN  AVAILABLE
 Blaydes House  VA 452 N3(144)  NOT FOR LOAN  LIB USE ONLY
36
Mark
  The Comanche code talkers of World War II.
Meadows, William C., 1966-
Austin : University of Texas Press, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  D 810 C88 M4  8 WEEK LOAN  AVAILABLE
37
Mark
  Codes and ciphers : Julius Caesar, the Enigma, and the internet.
Churchhouse, Robert Francis.
Cambridge : Cambridge University Press, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  Z 103 C5  8 WEEK LOAN  AVAILABLE
38
Mark
  Battle of wits : the complete story of codebreaking in World War II
Budiansky, Stephen.
New York, N.Y. ; London : Simon & Schuster, 2002.  
2002
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  D 810 C88 B9  8 WEEK LOAN  AVAILABLE
39
Mark
  Very special intelligence : the story of the Admiralty's Operational Intelligence Centre, 1939-1945.
Beesly, Patrick.
London : Greenhill, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 Blaydes House  D 810 S7 B4  NOT FOR LOAN  LIB USE ONLY
40
Mark
  Crypto : secrecy and privacy in the new code war
Levy, Steven.
London : Penguin, c2000.  
c2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  005.8 LEV  4 WEEK LOAN  AVAILABLE
41
Mark
  The code book : the secret history of codes and code-breaking.
Singh, Simon.
London : Fourth Estate, 2000.  
2000
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  Z 103 S6  8 WEEK LOAN  DUE 15-06-24
42
Mark
  The crypto controversy : a key conflict in the Information Society.
Koops, Bert-Jaap.
The Hague : Kluwer Law International, 1999.  
1999
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  QA 76.9 A25 K8  8 WEEK LOAN  AVAILABLE
43
Mark
  The codebreakers : the story of secret writing.
Kahn, David, 1930-
New York : Scribner, c1996.  
c1996
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Reading Room Mezzanine  Z 103 K1  8 WEEK LOAN  AVAILABLE
44
Mark
  The official PGP user's guide
Zimmermann, Philip (Philip R.)
Cambridge, Mass. ; London : MIT Press, c1995.  
c1995
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 3rd Floor  TK 5102.85 Z7  8 WEEK LOAN  AVAILABLE
45
Mark
  Public key cryptosystems : theory, application and implementation.
McAuley, Anthony Joseph.
1985.  
1985
THESIS
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL Basement b  T/H 1985 Ph.D. M1  UNTIL CLOSING  ASK at the Reading Room
46
Mark
  Beyond top secret U.
Montagu, Ewen, 1901-1985.
Newton Abbot : Readers Union, 1978.  
1978
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  D 810 C88 M7  8 WEEK LOAN  AVAILABLE
47
Mark
  Very special intelligence : the story of the Admiralty's Operational Intelligence Centre, 1939-1945
Beesly, Patrick.
London : Hamilton, 1977.  
1977
BOOK
LOCATION SHELVED AT LOAN TYPE STATUS
 BJL 4th Floor  D 810 S7 B4  8 WEEK LOAN  AVAILABLE
48
Mark
  Mercury: or, The secret and swift messenger : shewing how a man may with privacy and speed communica
Wilkins, John, 1614-1672.
London : Printed for Nathaniel Rolls, at his auction-house in Petty-Canons Hall, near the North-Side of St. Paul's Church, 1695. -Access this resource online
1695
EBOOKS
49
Mark
  Mercury, or, The secret and swift messenger : shewing, how a man may with privacy and speed communic
Wilkins, John, 1614-1672.
London : Printed for Rich. Baldwin ..., 1694. -Access this resource online
1694
EBOOKS
50
Mark
  Rules for explaining and decyphering all manner of secret writing, plain and demonstrative : with ex
J. F. (John Falconer)
London : Printed for Dan. Brown ... and Sam. Manship ..., 1692. -Access this resource online
1692
EBOOKS
Save marked records Save all on page
Locate in results
Result Page