Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Alternate Subjects (1-12 of 12)
Data Encryption Computer Science
1
E-Book/E-Doc
 

Audio content security : attack analysis on audio watermarking


Ghorbani, Sogand, author.
Cambridge, MA : Syngress is an imprint of Elsevier, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
2
Print Material
 

Catch me if you scan : constitutionality of compelled decryption divides the courts


Foster, Michael A. (Legislative attorney), author.
[Washington, D.C.] : Congressional Research Service, 2020- 2020

Rating:

Copies

3
E-Book/E-Doc
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943- author.
London : Academic Press, [2017] 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
4
E-Book/E-Doc
 

Cryptographic Boolean functions and applications


Cusick, Thomas W., 1943-
Amsterdam ; Boston : Academic Press/Elsevier, 2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
5
E-Book/E-Doc
 

Data hiding fundamentals and applications : content security in digital media


Sencar, Husrev T.
Amsterdam ; Boston : Elsevier Academic Press, ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
6
E-Book/E-Doc
 

Data hiding techniques in Windows OS : a practical approach to investigation and defense


Hassan, Nihad Ahmad.
Cambridge, MA : Syngress, 2016, ©2017. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
7
Print Material
 

Encryption and evolving technology : implications for U.S. law enforcement investigations


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, 2018- 2018

Rating:

Copies

8
E-Book/E-Doc
 

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis


Shavers, Brett, author.
Cambridge, MA : Syngress, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
9
Print Material
 

History of cryptography and cryptanalysis : codes, ciphers, and their algorithms


Dooley, John, 1952- author.
Cham, Switzerland : Springer, [2018] 2018

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 2nd Floor Stacks  652.8 D72h 2018    ---  Available
10
Print Material
 

Introduction to blockchain technology : the many faces of blockchain technology in the 21st century


Laurence, Tiana, author.
[VW's-Hertogenbosch, NL] : Van Haren Publishing , 2019. 2019

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  005.824 L373i 2019    ---  Available
11
E-Book/E-Doc
 

Next generation SSH2 implementation : securing data in motion


Liu, Dale.
Burlington, MA : Syngress Pub., ©2009. 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
12
E-Book/E-Doc
 

Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revi


Barker, Elaine B.
[Gaithersburg, Md.] : National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 A/REV.    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only