|
|
Cryptography : a new dimension in computer data security : a guide for the design and implementation : Meyer, Carl H.
|
1982
|
1
|
|
Cryptography : a primer : Konheim, Alan G.,
|
1981
|
1
|
|
Cryptography and coding : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003 :
|
2003
|
1
|
|
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto : Grimes, Roger A.,
|
2020
|
1
|
|
cryptography deciphering its progress
|
2005
|
1
|
|
Cryptography [electronic resource] : protocols, design and applications
|
2012
|
1
|
|
Cryptography for developers : St. Denis, Tom.
|
2007
|
1
|
|
Cryptography for developers [electronic resource] : St. Denis, Tom.
|
2007
|
1
|
|
Cryptography for security and privacy in cloud computing : Rass, Stefan,
|
2014
|
1
|
|
Cryptography, information theory, and error-correction : a handbook for the 21st century : Bruen, Aiden A.,
|
2005
|
1
|
|
cryptography primer
|
2009
|
1
|
|
Cryptography, steganography and data security
|
|
2
|
|
Cryptography; the science of secret writing. : Smith, Laurence Dwight.
|
1955
|
1
|
|
Cryptography : theory and practice : Stinson, Douglas R.
|
1995
|
1
|
|
Cryptography's role in securing the information society [electronic resource]
|
1996
|
1
|
|
Cryptolog [electronic resource]
|
1997
|
1
|
|
Cryptologic aspects of German intelligence activities in South America during World War II : Mowry, David P.,
|
2011
|
1
|
|
Cryptologic excellence [electronic resource] : yesterday, today, and tororrow.
|
2002
|
1
|
|
Cryptological mathematics : Lewand, Robert.
|
2000
|
1
|
|
Cryptology and information security series ; 3.
|
2009
|
1
|
|
Cryptology and information security series ; v. 1.
|
2008
|
1
|
|
Cryptology and information security series ; v. 2.
|
2009
|
1
|
|
Cryptology and information security series ; v. 4. : RFIDsec'10 Asia.
|
2010
|
1
|
|
Cryptology and information security series ; v. 5.
|
2011
|
1
|
|
Cryptology and information security series ; v. 6. : RFIDsec'11
|
2011
|
1
|
|
Cryptology and information security series ; v. 7.
|
2011
|
1
|
|
Cryptology and information security series ; v. 8 : Lo, Nai-Wai.
|
2012
|
1
|
|
Cryptology and information security series ; v. 9. : Weber, Stefan G.
|
2012
|
1
|
|
Cryptology and information security series ; v. 10.
|
2013
|
1
|
|
Cryptology and information security series ; v. 11.
|
2013
|
1
|
|
Cryptology and information security series ; v. 12. : RFIDsec '14 Asia
|
2014
|
1
|
|
Cryptology and information security series ; Volume 13.
|
2015
|
1
|
|
Cryptology and the winds message controversy : Hanyok, Robert J.
|
2008
|
1
|
|
Cryptology [electronic resource] : Buydos, John F.,
|
1996
|
1
|
|
Cryptology of the German intelligence services. : Mowry, David P.,
|
2011
|
1
|
|
Cryptology unlocked : Wobst, Reinhard.
|
2007
|
1
|
|
Cryptomarkets : a research companion : Martin, James,
|
2019
|
1
|
|
Cryptomimesis [electronic resource] : the gothic and Jacques Derrida's ghost writing : Castricano, Carla Jodey,
|
2001
|
1
|
|
Cryptonomicon : Stephenson, Neal.
|
1999
|
1
|
|
Cryptonymie. English : Abraham, Nicolas.
|
1986
|
1
|
|
Cryptopolitics : exposure, concealment, and digital media
|
2023
|
1
|
|
cryptosporidiosis
|
2002
|
1
|
|
Cryptosporidium and giardia in water by filtration/IMS/FA
|
2005
|
1
|
|
Cryptosporidium [electronic resource] : human health criteria document.
|
2001
|
1
|
|
Cryptosporidium [electronic resource] : the analytical challenge
|
2001
|
1
|
|
Cryptosporidium in water by filtration/IMS/FA
|
2005
|
1
|
|
Cryptozoa.
|
1912
|
1
|
|
Cryptozoic! : Aldiss, Brian W.
|
1967
|
1
|
|
cryptozoology
|
2007
|
1
|
|
Crypts, coffins, and corpses
|
2002
|
1
|
Add Marked to Bag
Add All On Page
|