Cryptography for Internet and database applications : developing secret and public key techniques with Java / Nick Galbreath.
Material type:
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
Dr. S. R. Lasker Library, EWU | 005.82 GAC 2002 (Browse shelf(Opens below)) | Not for loan | |||||
![]() |
Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 005.82 GAC 2002 (Browse shelf(Opens below)) | C-1 | Not For Loan | 13341 | ||
![]() |
Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.82 GAC 2002 (Browse shelf(Opens below)) | C-2 | Available | 13342 |
Browsing Dr. S. R. Lasker Library, EWU shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 STC 2018 Computer security : principles and practice / | 005.8 STN 2018 Network security essentials : applications and standards / | 005.82 DIG 2002 Digital signatures / | 005.82 GAC 2002 Cryptography for Internet and database applications : | 005.82 OOC 2021 Computer security and the internet : tools and jewels from malware to bitcoin / | 005.82 STC 2023 Cryptography and network security : principles and practice cryptography and network security / | 005.932 MCC 2002 Customizing and upgrading Linux / |
Wiley computer publishing.
Includes bibliographical references and index.
TOC Ch. 1. Bits and Bytes --
Ch. 2. Secret Key Cryptography --
Ch. 3. Public Key Cryptography --
Ch. 4. Random Numbers --
Ch. 5. Java Cryptography --
Ch. 6. Small Message Encoding and Encryption --
Ch. 7. Application and Data Architecture --
App. A. Java Cryptography Class Reference.
CSE
Tahur Ahmed
There are no comments on this title.