Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Num Mark Subjects (1-22 of 22) Media Year
1   Data Encryption Computer Science -- See Also Cryptography

--subdivision Cryptography under individual wars, e.g. World War, 1939-1945--Cryptography
   
2 Data Encryption Computer Science    
      Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm. Axe ProQuest E-Book:Available   Electronic Book 2015
      Audio content security : attack analysis on audio watermarking / Sogand Ghorbani, Iraj Sadegh Amiri. Axe Elsevier ScienceDirect Ebook:Available   Electronic Book 2016
      Basic methods of cryptography / Jan C. A. van der Lubbe ; translated by Steve Gee. Axe 3rd Floor Stacks:Available   Print Material 1998
      Bent functions : results and applications to cryptography / by Natalia Tokareva, Sobolev Institute of Axe ProQuest E-Book:Available   Electronic Book 2015
56 additional entries    
3 Data Encryption Computer Science Bibliography : Buydos, John F.,     
      Cryptology [electronic resource] / [compiled by John F. Buydos with David Kahn]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 1996
4 Data Encryption Computer Science Computer Networks United States : United States.     
      U.S. Citizenship and Immigration Services' laptop safeguards need improvements / Department of Homela Axe Federal Documents Online:Available   Electronic Book 2012
5 Data Encryption Computer Science Congresses    
      Algorithmic problems of group theory, their complexity, and applications to cryptography / Delaram Ka Axe ProQuest E-Book:Available   Electronic Book 2015
      Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed Axe ProQuest E-Book:Available   Electronic Book 2016
      Modelling cyber security [electronic resource] : approaches, methodology, strategies / edited by Umbe Axe ProQuest E-Book:Available   Electronic Book 2009
6 Data Encryption Computer Science Equipment And Supplies Standards United States : Iorga, Michaela.     
      Cryptographic and security testing [electronic resource] / Michaela Iorga and Carroll Brickenkamp. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2008
7 Data Encryption Computer Science Examinations Study Guides : Bayer, Chad M.     
      ExamWise for CIW security professional [electronic resource] : exam 1D0-470 / Chad M. Bayer. Axe ProQuest E-Book:Available   Electronic Book 2003
8 Data Encryption Computer Science Government Policy United States    
      Securing data for a post-quantum world / GAO, Science, Technology Assesment, and Analytics. Axe Federal Documents Online:Available   Electronic Book 2023
      Surveillance or security? [electronic resource] : the risks posed by new wiretapping technologies / S Axe ProQuest E-Book:Available   Electronic Book 2010
9 Data Encryption Computer Science Government Policy United States Congresses : Johnson, Anne,     
      Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed Axe ProQuest E-Book:Available   Electronic Book 2016
10 Data Encryption Computer Science Handbooks Manuals Etc : National Institute of Standards and Technology (U.S.)     
      Secure hash standard (SHS) [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2012
11 Data Encryption Computer Science History : Dooley, John,     
      History of cryptography and cryptanalysis : codes, ciphers, and their algorithms / John F. Dooley. Axe 2nd Floor Stacks:Available   Print Material 2018
12 Data Encryption Computer Science Law And Legislation    
      Burdens of proof [electronic resource] : cryptographic culture and evidence law in the age of electro Axe ProQuest E-Book:Available   Electronic Book 2012
      Electronic signatures in law / Stephen Mason of the Middle Temple, Barrister. Axe JSTOR Open Ebooks:Available   Electronic Book 2016
13 Data Encryption Computer Science Law And Legislation Great Britain : Mason, Stephen     
      Electronic signatures in law / Stephen Mason of the Middle Temple, Barrister. Axe JSTOR Open Ebooks:Available   Electronic Book 2016
14 Data Encryption Computer Science Law And Legislation United States    
      Digital Millennium Copyright Act section 104 report : hearing before the Subcommittee on Courts, the Axe Federal Documents Online:Available   Electronic Book 2002
      Electronic Signatures in Global and National Commerce Act [electronic resource] : conference report ( Axe Federal Documents Online:Available   ElectronicResource GovDoc 2000
      Electronic Signatures in Global and National Commerce Act [electronic resource] : the consumer consen Axe Federal Documents Online:Available   ElectronicResource GovDoc 2001
      Encryption : frequently asked questions / Chris Jaikaran. Axe Federal Documents Online:Available   Print Material 2018
4 additional entries    
15 Data Encryption Computer Science Mathematics      
      Guide to pairing-based cryptography / edited by Nadia El Mrabet, SAS-Ecole des Mines de Saint Etienne Axe ProQuest E-Book:Available   Electronic Book 2017
16 Data Encryption Computer Science Periodicals      
      ACM transactions on information and system security. Axe Basement Bound Periodicals :Available, Axe Basement Current Periodicals :Available   Print Serial 1998
17 Data Encryption Computer Science Standards    
      Announcing the Advanced Encryption Standard (AES) [electronic resource]. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2001
      Guide to storage encryption technologies for end user devices [electronic resource] / Karen Scarfone, Axe Federal Documents Online:Available   ElectronicResource GovDoc 2007
      Modes of operation validation system for the Triple Data Encryption Algorithm (TMOVS) [electronic res Axe Federal Documents Online:Available   ElectronicResource GovDoc 2000
18 Data Encryption Computer Science Standards United States    
      Recommendation for existing application-specific key derivation functions [electronic resource] / Quy Axe Federal Documents Online:Available   ElectronicResource GovDoc 2010
      Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen Axe Federal Documents Online:Available   ElectronicResource GovDoc 2011
      Recommendation for key management. Part 1, General / Elaine Barker [and others]. Axe Federal Documents Online:Available   Electronic Book 2006
      Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker Axe Federal Documents Online:Available   ElectronicResource GovDoc 2012
4 additional entries    
19 Data Encryption Computer Science Technological Innovations : United States.     
      The audio and video flags [electronic resource] : can content protection and technological innovation Axe Federal Documents Online:Available   ElectronicResource GovDoc 2006
20 Data Encryption Computer Science United States    
      Audit of the Executive Office for United States Attorneys' laptop computer and electronic tablet encr Axe Federal Documents Online:Available   ElectronicResource GovDoc 2014
      A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele Axe Federal Documents Online:Available   ElectronicResource GovDoc 2001
      Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W. Axe Federal Documents Online:Available   ElectronicResource GovDoc 2010
      Encryption, key recovery, and privacy protection in the information age : hearing before the Committe Axe Federal Documents Online:Available   Electronic Book 1997
2 additional entries    
21 Data Encryption Computer Science United States Evaluation : United States.     
      Information security [electronic resource] : federal agency efforts to encrypt sensitive information Axe Federal Documents Online:Available   ElectronicResource GovDoc 2008
Add Marked to Bag Add All On Page
 
    
Available items only