Поисковый запрос: (<.>S=Data structures, cryptology and information theory<.>) |
Общее количество найденных документов : 34
Показаны документы с 1 по 30 |
|
1.
| Tiwari S. AdvancED Flex 4/S. Tiwari, E. Elrom. - 2010
|
2.
| Walters R.E. Beginning sql server 2008 administration/R. E. Walters, G. Fritchey, C. Taglienti. - 2009
|
3.
| Classification and multivariate analysis for complex data structures/ed. B. Fichet [et al.]. - 2011
|
4.
| Biggs N. Codes: an introduction to information communication and cryptography/N. Biggs. - 2008
|
5.
| Moore T. Critical infrastructure protection iv/eds.: T. Moore, S. Shenoi. - 2010
|
6.
| Cryptology and network security/ed. S. Heng [et al.]. - 2010
|
7.
| Digital watermarking/ed. H. Kim [et al.]. - 2011
|
8.
| e-Business and telecommunications/eds. M. S. Obaidat, J. Filipe. - 2011
|
9.
| Hazay C. Efficient secure two-party protocols/C. Hazay, Y. Lindell. - 2010
|
10.
| Kiayias A. Encryption for digital content/A. Kiayias, S. Pehlivanoglu. - 2010
|
11.
| Engineering secure software and systems/ed. Ú. Erlingsson [et al.]. - 2011
|
12.
| Edge C.S. Enterprise mac administrator’s guide/C. S. Edge, B. Hunter, Z. Smith. - 2009
|
13.
| Chatterjee S. Identity-Based encryption/S. Chatterjee, P. Sarkar. - 2011
|
14.
| Information and communications security/ed. M. Soriano [et al.]. - 2010
|
15.
| iPhone advanced projects/J. Bondo [et al.]. - 2009
|
16.
| iPhone user interface design projects/D. Barnard [et al.]. - 2009
|
17.
| Sanderson H. Learn applescript/H. Sanderson, H. Rosenthal. - 2009
|
18.
| Nutting J. Learn cocoa on the mac/J. Nutting, D. Mark, J. LaMarche. - 2010
|
19.
| Yekhanin S. Locally decodable codes and private information retrieval schemes/S. Yekhanin. - 2010
|
20.
| Mark D. More iPhone 3 development/D. Mark, J. LaMarche. - 2009
|
21.
| Multimedia communications, services and security/ed. A. Dziech, A. Czyżewski. - 2011
|
22.
| Amigo J. Permutation complexity in dynamical systems/J. Amigo. - 2010
|
23.
| Policies and research in identity management/ed. E. Leeuw [et al]. - 2010
|
24.
| Practical signcryption/eds.: A. W. Dent, Y. Zheng. - 2010
|
25.
| Foresti S. Preserving privacy in data outsourcing/S. Foresti. - 2011
|
26.
| Privacy in statistical databases/eds. J. Domingo-Ferrer, E. Magkos. - 2011
|
27.
| Klein S. Pro entity framework 4.0/S. Klein. - 2010
|
28.
| Blanchard P. Random walks and diffusions on graphs and databases/P. Blanchard, D. Volchenkov. - 2011
|
29.
| Recent advances in intrusion detection/eds. S. Jha [et al.]. - 2010
|
30.
| Securing wireless communications at the physical layer/ed. R. Liu, W. Trappe. - 2010
|
|
|
|