Search Results for Cryptography - Narrowed by: Cryptography - Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dCryptography$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-04T19:56:00ZCryptography for developersent://SD_ILS/0/SD_ILS:1709672024-06-04T19:56:00Z2024-06-04T19:56:00Zby St. Denis, Tom<br/>Author St. Denis, Tom, Johnson, Simon<br/>Format: Books<br/>Call Number QA76.9.A25 S725 2007<br/>Publisher Syngrees Publishing,<br/>Publication Date 2007<br/>ISBN 9781597491044<br/>Introduction to cryptography : principles and applicationsent://SD_ILS/0/SD_ILS:1642192024-06-04T19:56:00Z2024-06-04T19:56:00Zby Delfs, Hans<br/>Author Delfs, Hans, Knebl, Helmut<br/>Format: Books<br/>Call Number QA76.9.A25 D44 2007<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/>Applications of cryptography and network securityent://SD_ILS/0/SD_ILS:8369342024-06-04T19:56:00Z2024-06-04T19:56:00Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5102.94 A675 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632400659<br/>Introduction to cryptography and network securityent://SD_ILS/0/SD_ILS:1558772024-06-04T19:56:00Z2024-06-04T19:56:00Zby Forouzan, Behrouz A.<br/>Author Forouzan, Behrouz A.<br/>Format: Books<br/>Call Number TK5105.59 F67 2008<br/>Publisher McGraw-Hill Higher Education,<br/>Publication Date 2007<br/>ISBN 9780073327532<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:6150192024-06-04T19:56:00Z2024-06-04T19:56:00Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Computer file<br/>Call Number CP 6691<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254969<br/>RSA Securitys official guide to cryptographyent://SD_ILS/0/SD_ILS:4371442024-06-04T19:56:00Z2024-06-04T19:56:00Zby Burnett, Steve<br/>Author Burnett, Steve, Paine, Stephen, RSA Security<br/>Format: Books<br/>Call Number TK5105.59 B87 2004<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2004<br/>ISBN 9780072254952<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-06-04T19:56:00Z2024-06-04T19:56:00Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Protocols and procedures of cryptography and network securityent://SD_ILS/0/SD_ILS:8351562024-06-04T19:56:00Z2024-06-04T19:56:00Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5105.59 P768 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632404237<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:5882922024-06-04T19:56:00Z2024-06-04T19:56:00Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 016838<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008 20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Comprehensive possible attacks on RSAent://SD_ILS/0/SD_ILS:3069042024-06-04T19:56:00Z2024-06-04T19:56:00Zby Majid Bakhtiari, 1961-<br/>Author Majid Bakhtiari, 1961-, Rabiah Ahmad, supervisor, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M23 2008 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-06-04T19:56:00Z2024-06-04T19:56:00Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Pengurusan kekunci dalam sistem penyediaan dan pencapaian keputusan pelajar secara on-lineent://SD_ILS/0/SD_ILS:72782024-06-04T19:56:00Z2024-06-04T19:56:00Zby Ng, Swee Lim<br/>Author Ng, Swee Lim<br/>Format: Visual Materials<br/>Call Number MFL 12835<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Sistem pelayan khas untuk pengurusan penyimpanan data imej bagi aplikasi grafik 2D menggunakan JAVA RMIent://SD_ILS/0/SD_ILS:76282024-06-04T19:56:00Z2024-06-04T19:56:00Zby Afnizawati Mohamad Noh<br/>Author Afnizawati Mohamad Noh<br/>Format: Visual Materials<br/>Call Number MFL 12991<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Prototaip sistem pengesahan untuk aplikasi CSCW dalam persekitaran web yang menggunakan protokol stesen ke stesenent://SD_ILS/0/SD_ILS:3084082024-06-04T19:56:00Z2024-06-04T19:56:00Zby Han, Maisie Wi-Mei<br/>Author Han, Maisie Wi-Mei<br/>Format: Books<br/>Call Number TK5105.59 H36 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Integrating security services into computer supported cooperative workent://SD_ILS/0/SD_ILS:1217262024-06-04T19:56:00Z2024-06-04T19:56:00Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof<br/>Format: Books<br/>Call Number TK5105.59 M34 2000 raf<br/>Publisher Aston University,<br/>Publication Date 2000<br/>Thesis (Doctor of Philosophy) - Aston University, 2000<br/>Flexural behaviour and durability of glass fibre reinforcedent://SD_ILS/0/SD_ILS:136422024-06-04T19:56:00Z2024-06-04T19:56:00Zby Abdul Rahman Mohd. Sam<br/>Author Abdul Rahman Mohd. Sam<br/>Format: Visual Materials<br/>Call Number MFL 10498<br/>Publisher University of Sheffield,<br/>Publication Date 1999<br/>Thesis (PhD) - University of Sheffield, 1999<br/>Tutorial : the security of data in networksent://SD_ILS/0/SD_ILS:2544092024-06-04T19:56:00Z2024-06-04T19:56:00Zby Davies, D. W.<br/>Author Davies, D. W.<br/>Format: Books<br/>Call Number TK5105.5 D36 1981 f<br/>Publisher IEEE Computer Society,<br/>Publication Date 1981<br/>Hacking the Hacker: Learn From the Experts Who Take Down Hackersent://SD_ILS/0/SD_ILS:8726132024-06-04T19:56:00Z2024-06-04T19:56:00Zby Grimes, Roger A.<br/>Author Grimes, Roger A.<br/>Format: Books<br/>Call Number QA76.9.A25 G75 2017<br/>ISBN 9781119396215<br/>