Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Num Mark Subjects (1-23 of 23) Media Year
1   Data Encryption Computer Science -- See Also Cryptography

--subdivision Cryptography under individual wars, e.g. World War, 1939-1945--Cryptography
   
2 Data Encryption Computer Science    
      Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm. Axe ProQuest E-Book:Available   E-Books/E-Docs 2015
      Basic methods of cryptography / Jan C. A. van der Lubbe ; translated by Steve Gee. Axe 3rd Floor Stacks:Available   Print Material 1998
      Bent functions : results and applications to cryptography / by Natalia Tokareva, Sobolev Institute of Axe ProQuest E-Book:Available   E-Books/E-Docs 2015
      Brute force : cracking the data encryption standard / Matt Curtin. Axe 3rd Floor Stacks:Available   Print Material 2005
42 additional entries    
3 Data Encryption Computer Science Bibliography : Buydos, John F.,     
      Cryptology [electronic resource] / [compiled by John F. Buydos with David Kahn]. Axe Federal Documents Online:Available   E-Books/E-Docs 1996
4 Data Encryption Computer Science Computer Networks United States : United States.     
      U.S. Citizenship and Immigration Services' laptop safeguards need improvements / Department of Homela Axe Federal Documents Online:Available   E-Books/E-Docs 2012
5 Data Encryption Computer Science Congresses    
      Algorithmic problems of group theory, their complexity, and applications to cryptography / Delaram Ka Axe ProQuest E-Book:Available   E-Books/E-Docs 2015
      Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed Axe ProQuest E-Book:Available   E-Books/E-Docs 2016
      Modelling cyber security [electronic resource] : approaches, methodology, strategies / edited by Umbe Axe ProQuest E-Book:Available   E-Books/E-Docs 2009
6 Data Encryption Computer Science Equipment And Supplies Standards United States : Iorga, Michaela.     
      Cryptographic and security testing [electronic resource] / Michaela Iorga and Carroll Brickenkamp. Axe Federal Documents Online:Available   E-Books/E-Docs 2008
7 Data Encryption Computer Science Examinations Study Guides : Bayer, Chad M.     
      ExamWise for CIW security professional [electronic resource] : exam 1D0-470 / Chad M. Bayer. Axe ProQuest E-Book:Available   E-Books/E-Docs 2003
8 Data Encryption Computer Science Fiction : Clancy, Tom,     
      Tom Clancy's power plays [sound recording] : ruthless. com / created by Tom Clancy and Martin Greenbe Parsons Audiobook Cassette Fiction:Available   Spoken Sound 1998
9 Data Encryption Computer Science Government Policy United States : Landau, Susan Eva.     
      Surveillance or security? [electronic resource] : the risks posed by new wiretapping technologies / S Axe ProQuest E-Book:Available   E-Books/E-Docs 2010
10 Data Encryption Computer Science Government Policy United States Congresses : Johnson, Anne,     
      Exploring encryption and potential mechanisms for authorized government access to plaintext : proceed Axe ProQuest E-Book:Available   E-Books/E-Docs 2016
11 Data Encryption Computer Science Handbooks Manuals Etc : National Institute of Standards and Technology (U.S.)     
      Secure hash standard (SHS) [electronic resource]. Axe Federal Documents Online:Available   E-Books/E-Docs 2012
12 Data Encryption Computer Science History : Dooley, John,     
      History of cryptography and cryptanalysis : codes, ciphers, and their algorithms / John F. Dooley. Axe 2nd Floor Stacks:Available   Print Material 2018
13 Data Encryption Computer Science Law And Legislation    
      Burdens of proof [electronic resource] : cryptographic culture and evidence law in the age of electro Axe ProQuest E-Book:Available   E-Books/E-Docs 2012
      Electronic signatures in law / Stephen Mason of the Middle Temple, Barrister. Axe JSTOR Open Ebooks:Available   E-Books/E-Docs 2016
14 Data Encryption Computer Science Law And Legislation Great Britain : Mason, Stephen     
      Electronic signatures in law / Stephen Mason of the Middle Temple, Barrister. Axe JSTOR Open Ebooks:Available   E-Books/E-Docs 2016
15 Data Encryption Computer Science Law And Legislation United States    
      Digital Millennium Copyright Act section 104 report : hearing before the Subcommittee on Courts, the Axe Federal Documents Online:Available   E-Books/E-Docs 2002
      Electronic Signatures in Global and National Commerce Act [electronic resource] : conference report ( Axe Federal Documents Online:Available   E-Books/E-Docs 2000
      Electronic Signatures in Global and National Commerce Act [electronic resource] : the consumer consen Axe Federal Documents Online:Available   E-Books/E-Docs 2001
      ESIGN, encouraging the use of electronic signatures in the financial services industry : hearing befo Axe Federal Documents Online:Available   E-Books/E-Docs 2001
3 additional entries    
16 Data Encryption Computer Science Mathematics      
      Guide to pairing-based cryptography / edited by Nadia El Mrabet, SAS-Ecole des Mines de Saint Etienne Axe ProQuest E-Book:Available   E-Books/E-Docs 2017
17 Data Encryption Computer Science Periodicals      
      ACM transactions on information and system security. Axe Basement Bound Periodicals :Available, Axe Basement Current Periodicals :Available   Print Serial 1998
18 Data Encryption Computer Science Standards    
      Announcing the Advanced Encryption Standard (AES) [electronic resource]. Axe Federal Documents Online:Available   E-Books/E-Docs 2001
      Guide to storage encryption technologies for end user devices [electronic resource] / Karen Scarfone, Axe Federal Documents Online:Available   E-Books/E-Docs 2007
      Modes of operation validation system for the Triple Data Encryption Algorithm (TMOVS) [electronic res Axe Federal Documents Online:Available   E-Books/E-Docs 2000
19 Data Encryption Computer Science Standards United States    
      Recommendation for existing application-specific key derivation functions [electronic resource] / Quy Axe Federal Documents Online:Available   E-Books/E-Docs 2010
      Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen Axe Federal Documents Online:Available   E-Books/E-Docs 2011
      Recommendation for key management. Part 1, General / Elaine Barker [and others]. Axe Federal Documents Online:Available   E-Books/E-Docs 2006
      Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker Axe Federal Documents Online:Available   E-Books/E-Docs 2012
4 additional entries    
20 Data Encryption Computer Science Technological Innovations : United States.     
      The audio and video flags [electronic resource] : can content protection and technological innovation Axe Federal Documents Online:Available   E-Books/E-Docs 2006
21 Data Encryption Computer Science United States    
      Audit of the Executive Office for United States Attorneys' laptop computer and electronic tablet encr Axe Federal Documents Online:Available   E-Books/E-Docs 2014
      A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele Axe Federal Documents Online:Available   E-Books/E-Docs 2001
      Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W. Axe Federal Documents Online:Available   E-Books/E-Docs 2010
      Encryption, key recovery, and privacy protection in the information age : hearing before the Committe Axe Federal Documents Online:Available   E-Books/E-Docs 1997
2 additional entries    
22 Data Encryption Computer Science United States Evaluation : United States.     
      Information security [electronic resource] : federal agency efforts to encrypt sensitive information Axe Federal Documents Online:Available   E-Books/E-Docs 2008
Add Marked to Bag Add All On Page
 
    
Available items only