Library
Your session will expire automatically in
0
seconds.
Continue session
End session now
(Search History)
KEYWORD: Cryptography. in All Libraries
(Clear Search History)
(End Search Session)
Search history function requires JavaScript.
SearchType
TITLE
KEYWORD
AUTHOR
SUBJECT
BJL CLASSMARK
KDL CLASSMARK
PERIODICAL TITLE
ISN
RESOURCE NAME
RESOURCE SUBJECT
Search
Search Scope
BJL, Hull
KDL, Scarborough
All Libraries
Limit search to available items
60 results found.
Sorted by
relevance
|
date
|
title
.
Result Page
1
2
Next
KEYWORDS (1-50 of 60)
Most relevant titles entries 1-22
1
Mark
History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms
Dooley, John F., author.
Cham : Springer, 2018.
Access this resource online
2018
EBOOKS
2
Mark
Introduction to cryptography with mathematical foundations and computer implementations
Stanoyevitch, Alexander.
Boca Raton, Fla. : Chapman & Hall/CRC, 2013.
2013
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 268 S7
8 WEEK LOAN
AVAILABLE
3
Mark
Cryptography engineering : design principles and practical applications.
Ferguson, Niels.
Indianapolis, Ind. : Wiley, 2010.
2010
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 F3
8 WEEK LOAN
AVAILABLE
4
Mark
Understanding cryptography a textbook for students and practitioners
Paar, Christof, 1963- author.
Berlin : Springer, [2010]
Access this resource online
2010
EBOOKS
5
Mark
Elementary number theory, cryptography and codes
Baldoni, M. Welleda, 1949-
Berlin : Springer, c2009.
c2009
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 241 B1
8 WEEK LOAN
DUE 09-05-24
6
Mark
Introduction to modern cryptography
Katz, Jonathan, 1974-
Boca Raton, Fla. : Chapman & Hall/CRC, c2008.
c2008
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 K2
8 WEEK LOAN
AVAILABLE
7
Mark
Cryptography and network security : principles and practice
Stallings, William.
Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.
c2006
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 S7
8 WEEK LOAN
AVAILABLE
8
Mark
Cryptography and public key infrastructure on the internet
Schmeh, Klaus, author.
Chichester : Wiley, c2003.
c2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 S3
4 WEEK LOAN
AVAILABLE
9
Mark
Introduction to cryptography.
Buchmann, Johannes.
New York : Springer-Verlag, 2001.
2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 268 B9
8 WEEK LOAN
AVAILABLE
10
Mark
Designs, codes and cryptography.
London : Kluwer, 1997-2001.
2001
PERIODICAL
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL basement journals
QA 1 D35
1997,v.10-12
7 DAYS
ASK at the Reading Room
BJL basement journals
QA 1 D35
1998,v.13-15
7 DAYS
ASK at the Reading Room
BJL basement journals
QA 1 D35
1999,v.16-18
7 DAYS
ASK at the Reading Room
Click to view copies/volumes at all libraries
11
Mark
Cryptography decrypted
Mel, H. X., 1948- author.
Boston, Mass. : Addison-Wesley, 2001.
2001
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 76.9 A25 M5
4 WEEK LOAN
AVAILABLE
12
Mark
Coding theory and cryptography : the essentials
New York : Marcel Dekker, c2000.
c2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 268 C6
8 WEEK LOAN
AVAILABLE
13
Mark
Java cryptography.
Knudsen, Jonathan.
Cambridge : O'Reilly and Associates, 1998.
1998
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.82 KNU
4 WEEK LOAN
AVAILABLE
14
Mark
Disappearing cryptography : being and nothingness on the Net.
Wayner, Peter, 1964-
Boston, Mass. : AP Professional, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5105.59 W3
8 WEEK LOAN
AVAILABLE
15
Mark
Applied cryptography : protocols, algorithms, and source code in C.
Schneier, Bruce, 1963-
New York : Wiley, 1996.
1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 S3
8 WEEK LOAN
AVAILABLE
BJL 3rd Floor
QA 76.9 A25 S3
8 WEEK LOAN
AVAILABLE
16
Mark
A course in number theory and cryptography.
Koblitz, Neal.
New York : Springer, 1994.
1994
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA 241 K7
4 WEEK LOAN
AVAILABLE
17
Mark
Geometries, codes and cryptography
International Centre for Mechanical Sciences.
Wien : Springer, 1990.
1990
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 268 G3
8 WEEK LOAN
AVAILABLE
18
Mark
Number theory and cryptography
London Mathematical Society.
Cambridge : Cambridge Unversity Press, 1990.
1990
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 241 N9
8 WEEK LOAN
AVAILABLE
19
Mark
Codes and cryptography.
Welsh, Dominic.
Oxford : Clarendon Press, 1988.
1988
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 268 W4
8 WEEK LOAN
AVAILABLE
20
Mark
Cryptography.
Konheim, Alan G., 1934-
New York : Wiley, 1981.
1981
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
Z 103 K7
8 WEEK LOAN
AVAILABLE
21
Mark
Cryptography, the science of secret writing.
Smith, Lawrence Dwight.
London : Allen & Unwin, 1944.
1944
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
Z 103 S6
8 WEEK LOAN
AVAILABLE
22
Mark
A new method of cryptography, humbly presented to the most serene Majesty of Charles the II. By Samu
Morland, Samuel, Sir, 1625-1695.
[London : s.n., 1666]
Access this resource online
1666
EBOOKS
Highly relevant titles entries 23-26
23
Mark
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption
Holden, Joshua, 1970- author.
Princeton : Princeton University Press, [2017]
Access this resource online
2017
EBOOKS
24
Mark
The physics of quantum information : quantum cryptography, quantum teleportation, quantum computatio
New York : Springer, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.889 P5
8 WEEK LOAN
AVAILABLE
25
Mark
The limits of trust : cryptography, governments, and electronic commerce
Baker, Stewart A. (Stewart Abercrombie), 1947-
The Hague : Kluwer Law International, 1998.
1998
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 2nd Floor
K 564 C6 B1
8 WEEK LOAN
AVAILABLE
26
Mark
Number theory in science and communication : with applications in cryptography, physics, digital inf
Schroeder, Manfred Robert.
London : Springer-Verlag, 1990.
1990
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 241 S3
8 WEEK LOAN
AVAILABLE
Very relevant titles entries 27-60
27
Mark
The ancient Egyptian Netherworld Books
Darnell, John Coleman, author, translator.
Atlanta : SBL Press, [2018]
Access this resource online
2018
EBOOKS
28
Mark
Foundations of coding : compression, encryption, error correction
Dumas, Jean-Guillaume.
Hoboken, New Jersey : Wiley, [2015]
Access this resource online
2015
EBOOKS
29
Mark
Fundamentals of information systems security
Kim, David (Information technology security consultant)
Burlington, Mass. : Jones & Bartlett Learning, c2014.
c2014
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
QA76.9.A25 K536 2014
4 WEEK LOAN
AVAILABLE
30
Mark
Introduction to computer and network security : navigating shades of gray
Brooks, Richard R.
London : CRC Press, 2013.
Access this resource online
2013
EBOOKS
31
Mark
Principles of computer security CompTIA security+ and beyond (exam SY0-301)
New York : McGraw-Hill, c2012.
Access this resource online
c2012
EBOOKS
32
Mark
The history of information security a comprehensive handbook
Amsterdam ; London : Elsevier, c2007.
Access this resource online
c2007
EBOOKS
33
Mark
Decoding mathematics
Ball, Derek.
Derby : Association of Teachers of Mathematics, 2003.
2003
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room 1st floor HDC
q QA 43 B1
4 WEEK LOAN
AVAILABLE
34
Mark
Body of secrets : how America's NSA and Britain's GCHQ eavesdrop on the world.
Bamford, James.
London : Arrow, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 4th Floor
UB 256 U5 B1
8 WEEK LOAN
AVAILABLE
35
Mark
The Battle of the Atlantic and signals intelligence : U-boat tracking papers, 1941-1947
Aldershot : Ashgate for the Navy Records Society, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 4th Floor
VA 452 N3(144)
8 WEEK LOAN
AVAILABLE
Blaydes House
VA 452 N3(144)
NOT FOR LOAN
LIB USE ONLY
36
Mark
The Comanche code talkers of World War II.
Meadows, William C., 1966-
Austin : University of Texas Press, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 4th Floor
D 810 C88 M4
8 WEEK LOAN
AVAILABLE
37
Mark
Codes and ciphers : Julius Caesar, the Enigma, and the internet.
Churchhouse, Robert Francis.
Cambridge : Cambridge University Press, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
Z 103 C5
8 WEEK LOAN
AVAILABLE
38
Mark
Battle of wits : the complete story of codebreaking in World War II
Budiansky, Stephen.
New York, N.Y. ; London : Simon & Schuster, 2002.
2002
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 4th Floor
D 810 C88 B9
8 WEEK LOAN
AVAILABLE
39
Mark
Very special intelligence : the story of the Admiralty's Operational Intelligence Centre, 1939-1945.
Beesly, Patrick.
London : Greenhill, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
Blaydes House
D 810 S7 B4
NOT FOR LOAN
LIB USE ONLY
40
Mark
Crypto : secrecy and privacy in the new code war
Levy, Steven.
London : Penguin, c2000.
c2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
005.8 LEV
4 WEEK LOAN
AVAILABLE
41
Mark
The code book : the secret history of codes and code-breaking.
Singh, Simon.
London : Fourth Estate, 2000.
2000
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
Z 103 S6
8 WEEK LOAN
DUE 15-06-24
42
Mark
The crypto controversy : a key conflict in the Information Society.
Koops, Bert-Jaap.
The Hague : Kluwer Law International, 1999.
1999
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
QA 76.9 A25 K8
8 WEEK LOAN
AVAILABLE
43
Mark
The codebreakers : the story of secret writing.
Kahn, David, 1930-
New York : Scribner, c1996.
c1996
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Reading Room Mezzanine
Z 103 K1
8 WEEK LOAN
AVAILABLE
44
Mark
The official PGP user's guide
Zimmermann, Philip (Philip R.)
Cambridge, Mass. ; London : MIT Press, c1995.
c1995
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 3rd Floor
TK 5102.85 Z7
8 WEEK LOAN
AVAILABLE
45
Mark
Public key cryptosystems : theory, application and implementation.
McAuley, Anthony Joseph.
1985.
1985
THESIS
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL Basement b
T/H 1985 Ph.D. M1
UNTIL CLOSING
ASK at the Reading Room
46
Mark
Beyond top secret U.
Montagu, Ewen, 1901-1985.
Newton Abbot : Readers Union, 1978.
1978
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 4th Floor
D 810 C88 M7
8 WEEK LOAN
AVAILABLE
47
Mark
Very special intelligence : the story of the Admiralty's Operational Intelligence Centre, 1939-1945
Beesly, Patrick.
London : Hamilton, 1977.
1977
BOOK
LOCATION
SHELVED AT
LOAN TYPE
STATUS
BJL 4th Floor
D 810 S7 B4
8 WEEK LOAN
AVAILABLE
48
Mark
Mercury: or, The secret and swift messenger : shewing how a man may with privacy and speed communica
Wilkins, John, 1614-1672.
London : Printed for Nathaniel Rolls, at his auction-house in Petty-Canons Hall, near the North-Side of St. Paul's Church, 1695.
Access this resource online
1695
EBOOKS
49
Mark
Mercury, or, The secret and swift messenger : shewing, how a man may with privacy and speed communic
Wilkins, John, 1614-1672.
London : Printed for Rich. Baldwin ..., 1694.
Access this resource online
1694
EBOOKS
50
Mark
Rules for explaining and decyphering all manner of secret writing, plain and demonstrative : with ex
J. F. (John Falconer)
London : Printed for Dan. Brown ... and Sam. Manship ..., 1692.
Access this resource online
1692
EBOOKS
Result Page
1
2
Next
(Search History)
KEYWORD: Cryptography. in All Libraries
(Clear Search History)
(End Search Session)