Skip to main content
NLUMeg Library
Your cart is empty.
Cart
Lists
Public lists
New Arrivals
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
NLU Meghalaya Library
Online Public Access Catalogue (OPAC)
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Advanced search
Authority search
Tag cloud
Contact
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'su:"Chiffrement Informatique"'
Refine your search
Availability
Limit to records with available items
Authors
Bray, Shannon
Davies, Joshua A.
Grimes, Roger A.
Low, Richard M.
Pointcheval, David
Stamp, Mark
Show more
Show less
Series
Sciences. Computer s...
Topics
Chiffrement (Informa...
Computer networks
COMPUTERS
Computer security
Cryptographie
Cryptography
Data encryption (Com...
Informatique quantiq...
Python (Computer pro...
Python (Langage de p...
Quantum computing
R�eseaux d'ordinateu...
S�ecurit�e informati...
Show more
Show less
Your search returned 5 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to cart
Add to list
New list
Place hold
Results
1.
Image from Amazon.com
Applied cryptanalysis : breaking ciphers in the real world /
Mark Stamp, Richard M. Low.
by
Stamp, Mark
Low, Richard M
, 1967-
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publication details:
Hoboken, N.J. :
Wiley-Interscience,
�2007
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
2.
Image from Amazon.com
Implementing SSL/TLS using cryptography and PKI /
Joshua Davies.
by
Davies, Joshua A. (Joshua Aaron)
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publication details:
Hoboken, N.J. : Chichester :
Wiley ; John Wiley [distributor],
�2011
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
3.
Image from Amazon.com
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto /
Roger A. Grimes.
by
Grimes, Roger A
[author.]
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Hoboken, NJ :
Wiley,
2020
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
4.
Image from Amazon.com
Implementing cryptography using Python /
Shannon W. Bray.
by
Bray, Shannon
, 1972-
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publication details:
Indianapolis :
Wiley,
2020
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
5.
Image from Amazon.com
Asymmetric cryptography : primitives and protocols /
coordinated by David Pointcheval.
by
Pointcheval, David
[editor.]
Series:
Sciences (Editions Eshel)
. Computer science: Cryptography, data security.
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
London, UK :
ISTE, Ltd. ;
Hoboken, NJ :
John Wiley & Sons, Inc.,
2022
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
Not finding what you're looking for?
Make a
purchase suggestion