Ciphers, codes, algorithms, and keys

Readers can anticipate an intriguing overview of the ciphers, codes, algorithms, and keys used in real-life situations to keep peoples' information safe and secure.

9781508173069
book

Holdings

hidmidmiidnidwidlocation_codelocationbarcodecallnumdeweycreatedupdated
14023140137372269610778807646LIVH286T 340267005.8 LAB5.815754856551709567815
96878946872502196610778807646RHVO406RHVO041044005.8 LA5.815802161721708963493
131962349846422177610778807646PEHS370PEHS69343005.82 LAB5.8215814652241708963493
229216358354792287610778807646WARH437WARH42615005.8 LA5.816170249331709567815
256733760773142139610778807646WIH511WIS0032466005.8 LA5.816377825731695044385
260623961091462140610778807646WAS469WOS60297005.82 LAB5.8216377825731695044385
277106762594232097610778807646GEM227GVM0050426005.82 LAB5.8216377825731695044385
373419670534182194610778807646RHRO407RHJH811532005.8 LA5.816927942501708963493