Skip to main content
NLUMeg Library
Your cart is empty.
Cart
Lists
Public lists
New Arrivals
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
NLU Meghalaya Library
Online Public Access Catalogue (OPAC)
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Advanced search
Authority search
Tag cloud
Contact
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'su:"Cryptographie."'
Refine your search
Availability
Limit to records with available items
Authors
Ferguson, Niels
Grimes, Roger A.
Kohno, Tadayoshi
Konheim, Alan G.
Low, Richard M.
Pointcheval, David
Schneier, Bruce
Stamp, Mark
Show more
Show less
Series
Sciences. Computer s...
Topics
C (Computer program ...
Chiffrement (Informa...
Computer networks
Computers
COMPUTERS
Computer security
Computer Security
Cryptographie
Cryptography
Data encryption (Com...
Hackers
Hacking
Kryptologi
Kryptologie
Pirates informatique...
S�ecurit�e informati...
Show more
Show less
Your search returned 7 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to cart
Add to list
New list
Place hold
Results
1.
Image from Amazon.com
Computer security and cryptography /
Alan G. Konheim.
by
Konheim, Alan G
, 1934-
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publication details:
Hoboken, N.J. :
Wiley-Interscience,
�2007
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
2.
Image from Amazon.com
Applied cryptanalysis : breaking ciphers in the real world /
Mark Stamp, Richard M. Low.
by
Stamp, Mark
Low, Richard M
, 1967-
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publication details:
Hoboken, N.J. :
Wiley-Interscience,
�2007
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
3.
Image from Amazon.com
Cryptography engineering : design principles and practical applications /
Tadayoshi Kohno, Niels Ferguson, Bruce Schneier.
by
Kohno, Tadayoshi
Ferguson, Niels
Schneier, Bruce
, 1963-
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publication details:
Indianapolis, IN :
Wiley Pub., Inc.,
�2010
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
4.
Image from Amazon.com
Applied cryptography : protocols, algorithms, and source code in C /
Bruce Schneier.
by
Schneier, Bruce
, 1963-
[author.]
Edition:
Second edition, 20th anniversary edition.
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, IN :
John Wiley & Sons,
[2015]
Copyright date:
�2015
Other title:
Protocols, algorithms, and source code in C
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
5.
Image from Amazon.com
Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto /
Roger A. Grimes.
by
Grimes, Roger A
[author.]
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Hoboken, NJ :
Wiley,
2020
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
6.
Image from Amazon.com
Hacking multifactor authentication /
Roger A. Grimes.
by
Grimes, Roger A
[author.]
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
Indianapolis, IN :
John Wiley & Sons, Inc.,
[2021]
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
7.
Image from Amazon.com
Asymmetric cryptography : primitives and protocols /
coordinated by David Pointcheval.
by
Pointcheval, David
[editor.]
Series:
Sciences (Editions Eshel)
. Computer science: Cryptography, data security.
Material type:
Text
; Format:
available online
; Literary form:
Not fiction
Publisher:
London, UK :
ISTE, Ltd. ;
Hoboken, NJ :
John Wiley & Sons, Inc.,
2022
Online resources:
Click here to access online
Availability:
No items available.
Save to lists
Add to cart
(remove)
Not finding what you're looking for?
Make a
purchase suggestion