Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Result Page   
Add Marked to Bag Add All On Page
Subjects (1-50 of 107)
Data Encryption Computer Science
1
E-Books/E-Docs
 

Android malware


Jiang, Xuxian, author.
New York : Springer, [2013] 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
2
E-Books/E-Docs
 

Applications of secure multiparty computation



Amsterdam, [The Netherlands] : IOS Press, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
3
Print Material
 

Basic methods of cryptography


Lubbe, J. C. A. van der (Jan C. A.)
Cambridge, U.K. ; New York : Cambridge University Press, 1998. 1998

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 L961b    ---  Available
4
E-Books/E-Docs
 

Bent functions : results and applications to cryptography


Tokareva, Natalia, author.
London, UK : Elsevier Science, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
5
E-Books/E-Docs
 

Bent functions : results and applications to cryptography


Tokareva, Natalia, author.
London, UK : Academic Press is an imprint of Elsevier, [2015] 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
6
Spoken Sound
 

Blockchain and the Law The Rule of Code


Filippi, Primavera De.
[S.l.] : Recorded Books, Inc. ; [Norwood, Mass.] : [distributed by] Skillsoft Books, 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
7
E-Books/E-Docs
 

Blockchain for Dummies, 2nd Edition


Laurence, Tiana, author.
[Place of publication not identified] : John Wiley & Sons (US), 2019. 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
8
Print Material
 

Brute force : cracking the data encryption standard


Curtin, Matt.
New York : Copernicus Books, c2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C94b 2005    ---  Available
9
E-Books/E-Docs
 

Color image watermarking : algorithms and technologies


Su, Qingtang, author.
Berlin, [Germany] ; Boston, [Massachusetts] : De Gruyter, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
10
E-Books/E-Docs
 

Cryptographic algorithms and key sizes for personal identity verification


Polk, W. Timothy.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-78    ---  Available
11
E-Books/E-Docs
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., author.
London, England : Academic Press, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
12
E-Books/E-Docs
 

Cryptography and network security a practical approach


Haribaskar, K.
New Delhi, India : University Press, 2014 (Norwood, Mass. : Books24x7.com [generator]) 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
13
E-Books/E-Docs
 

Cryptography and secure communication


Blahut, Richard E.
Cambridge, U.K. ; New York : Cambridge University Press, 2014 (Norwood, Mass. : Books24x7.com [generator]) 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
14
E-Books/E-Docs
 

Cryptography protocols, design and applications



Hauppauge, N.Y. : Nova Science Publishers, c2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
15
E-Books/E-Docs
 

Cryptography for developers


St Denis, Tom.
Rockland, Mass. : Syngress Publishers, c2007 (Norwood, Mass. : Books24x7.com [generator]) 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
16
E-Books/E-Docs
 

Data Hiding Techniques in Windows OS : A Practical Approach to Investigation and Defense


Hassan, Nihad Ahmad, author.
[Place of publication not identified] : Elsevier Science and Technology Books, Inc., 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
17
E-Books/E-Docs
 

Deploying a public key infrastructure



Austin, Tex. : IBM Corporation, c2000 (Norwood, Mass. : Books24x7.com [generator]) 2000

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
18
E-Books/E-Docs
 

Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certificati


Salam, Abdul, author.
Indianapolis, Indiana : John Wiley & Sons, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
19
E-Books/E-Docs
 

Developing a Blockchain Business Network with Hyperledger Composer Using the IBM Blockchain Platform


Morris, Vance, author.
[Place of publication not identified] : IBM Corporation, 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
20
E-Books/E-Docs
 

Electronic payment systems


O'Mahony, Donal, 1961-
Norwood, Mass. : Artech House, c1997 (Norwood, Mass. : Books24x7.com [generator]) 1997

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
21
Print Material
 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  323.448 El25    ---  Available
22
E-Books/E-Docs
 

Ethereum for Architects and Developers : With Case Studies and Code Samples in Solidity


Mohanty, Debajani, author.
[Place of publication not identified] : Apress, 2018. 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
23
E-Books/E-Docs
 

Evaluation of the SEC encryption program


United States. Securities and Exchange Commission. Office of Audits.
Washington, D.C. : U.S. Securities and Exchange Commission, Office of Inspector General, Office of Audits, [2010] 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  SE 1.42:476    ---  Available
24
E-Books/E-Docs
 

Expert SQL server 2008 encryption


Coles, Michael.
[Berkeley, CA] : Apress, c2009 (Norwood, Mass. : Books24x7.com [generator]) 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
25
E-Books/E-Docs
 

Foundations of security what every programmer needs to know


Daswani, Neil.
Berkeley, Calif. : Apress, c2007 (Norwood, Mass. : Books24x7.com [generator]) 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
26
E-Books/E-Docs
 

The global internet trust register



Cambridge, MA : MIT Press, c1999 (Norwood, Mass. : Books24x7.com [generator]) 1999

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
27
E-Books/E-Docs
 

The global internet trust register



Cambridge, MA : MIT Press, c1999 (Norwood, Mass. : Books24x7.com [generator]) 1999

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Business Pro E-Book  Electronic Book    ---  Available
28
E-Books/E-Docs
 

Hacking point of sale payment application secrets, threats, and solutions


Gomzin, Slava.
Indianapolis, Ind. : John Wiley & Sons, c2014 (Norwood, Mass. : Books24x7.com [generator]) 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
29
E-Books/E-Docs
 

Hashing in computer science fifty years of slicing and dicing


Konheim, Alan G., 1934-
Hoboken, N.J. : John Wiley & Sons, 2010. 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
30
E-Books/E-Docs
 

Healthcare information privacy and security regulatory compliance and data security in the age of el


Robichau, Bernard Peter.
[New York] : Apress, c2014 (Norwood, Mass. : Books24x7.com [generator]) 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
31
E-Books/E-Docs
 

Healthcare information privacy and security regulatory compliance and data security in the age of el


Robichau, Bernard Peter.
[New York] : Apress, c2014 (Norwood, Mass. : Books24x7.com [generator]) 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Business Pro E-Book  Electronic Book    ---  Available
32
E-Books/E-Docs
 

Identity-based cryptography



Amsterdam ; Boston : IOS Press, c2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
33
Print Material
 

Identity-based encryption


Chatterjee, Sanjit.
New York : Springer, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 C392i 2011    ---  Available
34
E-Books/E-Docs
 

Image and video encryption from digital rights management to secured personal communication


Uhl, Andreas, 1968-
[Boston, Mass.?] : Springer, c2005 (Norwood, Mass. : Books24x7.com [generator]) 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
35
E-Books/E-Docs
 

Implementing SSH strategies for optimizing the Secure Shell


Dwivedi, Himanshu.
Indianapolis, Ind. ; [Chichester] : Wiley, c2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
36
E-Books/E-Docs
 

Implementing SSH strategies for optimizing the Secure Shell


Dwivedi, Himanshu.
Indianapolis, Ind. : Wiley, c2004 (Norwood, Mass. : Books24x7.com [generator]) 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
37
E-Books/E-Docs
 

Information hiding


Katzenbeisser, Stefan, author.
Boston, [Massachusetts] ; London, England : Artech House, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
38
E-Books/E-Docs
 

Innovative cryptography, second edition


Moldovyan, Nick.
Boston : Charles River Media, c2007 (Norwood, Mass. : Books24x7.com [generator]) 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
39
E-Books/E-Docs
 

Intel trusted execution technology for server platforms a guide to more secure datacenters


Futral, William T.
[New York] : ApressOpen, c2013 (Norwood, Mass. : Books24x7.com [generator]) 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
40
Print Material
 

Introduction to blockchain technology : the many faces of blockchain technology in the 21st century


Laurence, Tiana, author.
[VW's-Hertogenbosch, NL] : Van Haren Publishing , 2019. 2019

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.824 L373i 2019    ---  Available
41
E-Books/E-Docs
 

Introduction to cryptography with Maple


Gómez Pardo, José Luis, author.
Berlin : Springer, [2013] 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
42
Print Material
 

Introduction to cryptography with mathematical foundations and computer implementations


Stanoyevitch, Alexander.
Boca Raton : Chapman & Hall/CRC, c2011. 2011

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.82 St25i 2011    ---  Available
43
E-Books/E-Docs
 

Introduction to cryptography with open-source software


McAndrew, Alasdair, author.
Boca Raton, Florida ; London, [England] ; New York : CRC Press, 2011. 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
44
E-Books/E-Docs
 

Introduction to identity-based encryption


Martin, Luther.
Boston : Artech House, c2008. 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
45
E-Books/E-Docs
 

Introduction to identity-based encryption


Martin, Luther.
Boston : Artech House, c2008 (Norwood, Mass. : Books24x7.com [generator]) 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
46
E-Books/E-Docs
 

The keyed-hash message authentication code (HMAC)


Information Technology Laboratory (National Institute of Standards and Technology)
Gaithersburg, MD : Information Technology Laboratory, U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:198-1    ---  Available
47
E-Books/E-Docs
 

Loseless information : hiding in images


Lu, Zhe-Ming, author.
Amsterdam, [Netherlands] : Zhejiang University Press : Syngress, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
48
E-Books/E-Docs
 

Machine learning in image steganalysis


Schaathun, Hans Georg.
Hoboken : Wiley, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe ProQuest E-Book  Electronic Book    ---  Available
49
E-Books/E-Docs
 

Machine learning in image steganalysis


Schaathun, Hans Georg.
Chichester, West Sussex, U.K. : John Wiley & Sons Ltd, 2012 (Norwood, Mass. : Books24x7.com [generator]) 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
50
E-Books/E-Docs
 

Mobile authentication problems and solutions


Jakobsson, Markus.
New York : Springer, c2013 (Norwood, Mass. : Books24x7.com [generator]) 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe IT Pro E-Book  Electronic Book    ---  Available
Add Marked to Bag Add All On Page
Locate in results
Result Page   
 
    
Available items only