Search ResultsElectronic Resources
6 Results Found Subscribe to search results
000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Martin, Luther.
      Format: 
      Excerpt: 
      Data encryption (Computer science)
      by 
      Furnell, Steven, 1970-
      Format: 
      Excerpt: 
      Data encryption (Computer science)
      by 
      Krishnamurthy Madwachar, Mohan.
      Format: 
      Excerpt: 
      following three-part structure in mind: locking down the network, securing data passing across the network
      by 
      Crowley, Patrick, 1974-
      Format: 
      Excerpt: 
      -specific processors, such as classification and encryption engines, to more general-purpose packet or communications
      by 
      Kanclirz, Jan.
      Format: 
      Excerpt: 
      Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set
      by 
      Celko, Joe.
      Format: 
      Excerpt: 
      Encryption via Tables -- 8.2 Check Digits via Tables -- 8.2.1 Check Digits Defi ned -- 8.2.2 Error Detection