|
An introduction to mathematical cryptography
|
Jeffrey Hoffstein |
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics wh… |
OL13764896W |
|
Ultra hush-hush
|
Stephen Shapiro,Tina Forrester |
Provides an inside look at some of the real-life deceptions that turned the tide of World War II, describing the creative strategies that were used by all sides during the war. |
OL19926244W |
|
Number Theory Toward RSA Cryptography: in 10 Undergraduate Lectures (Discrete Mathematics) (Volume …
|
Dr. Mohamed Omar |
53 pages ; 23 cm |
OL20122836W |
|
Top secret
|
Helen Huckle |
Les multiples techniques de codages de messages, du morse à l'encre invisible. |
OL24856085W |
|
I spy
|
Diana Noonan |
The first story tells how spies hide secret messages. The second story tells how secret messages could be sent to a friend. |
OL2852955W |
|
Break that code
|
Sharon Dalgleish,Lisa Thompson |
Learn how codes have been used since ancient times, and how to use your skills to break some codes. |
OL28760090W |
|
Théo et le code de Lascaux
|
Didier Leterq |
Littérature jeunesse: Lascaux (France, grotte), enfants, enquêtes, courage, personnes disparues
Théo est très inquiet : son grand-père n'a pas donné signe de vie depuis deux semaines. Marguerite, la… |
OL29237019W |
|
Death by Exposure
|
PH,Kevin Spreekmeester,Eric Walters |
A body is found frozen in a glacier with a roll of film. Readers can use the photographs and information provided about latitude, longitude and codes to solve the mystery. |
OL516456W |
|
Computer Security and Cryptography
|
Alan G. Konheim |
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data securit… |
OL6335110W |
|
Investigator's Guide to Steganography
|
Gregory Kipper |
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incide… |
OL8637041W |