Ciphers, codes, algorithms, and keys

Readers can anticipate an intriguing overview of the ciphers, codes, algorithms, and keys used in real-life situations to keep peoples' information safe and secure.

9781508173069
book

Holdings

hidmidmiidnidwidlocation_codelocationbarcodecallnumdeweycreatedupdated
14023140137372269610778807646LIVH286T 340267005.8 LAB5.815754856551709567815
96878946872502338610778807646RHVO406RHVO041044005.8 LA5.815802161721736518457
131962349846422319610778807646PEHS370PEHS69343005.82 LAB5.8215814652241736518457
229216358354792287610778807646WARH437WARH42615005.8 LA5.816170249331709567815
256733760773142364610778807646WIH511WIS0032466005.8 LA5.816377825731736800991
260623961091462367610778807646WAS469WOS60297005.82 LAB5.8216377825731736800991
277106762594232385610778807646GEM227GVM0050426005.82 LAB5.8216377825731736800991
373419670534182336610778807646RHRO407RHJH811532005.8 LA5.816927942501736518457