Title: Mathematical Recreations & Essays: Twelfth Edition, Author: W. W. Rouse Ball
Title: Audafest: Ergebnisse einer empirischen Erhebung zum Themenbereich
Title: The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies, Author: Bloomsbury Academic
Title: Machine Cryptography And Modern Cryptanalysis, Author: Cipher a Deavours
Title: Datenschutz und Datensicherung im Wandel der Informationstechnologien: 1.GI-Fachtagung M�nchen, 30. und 31. Oktober 1985 Proceedings, Author: Peter P. Spies
Title: Advances in Cryptology: Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984, Author: Thomas Beth
Title: The Right of Privacy in the Computer Age, Author: Warren Freedman
Title: Cryptology, Author: Cipher a Deavours
Title: An Introduction to Cryptology, Author: Henk C.A. van Tilborg
Title: Private Rights, Public Wrongs: The Computer and Personal Privacy, Author: Michael Rogers Rubin
Title: Approximative Public-Key-Kryptosysteme, Author: Patrick Horster
Title: Electronic Facilities Engineering - MIL-HDBK-1012/1: MiL-HDBK-1012/1, Author: Department of Defense
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Computers Under Attack: Intruders, Worms and Viruses, Author: Peter Denning
Title: Keine Macht den Viren!: Das Buch-/Softwarepaket zum Schutz wertvoller Daten und Programme, Author: Pamela Kane
Title: Anwenderleitfaden Norton Utilities: Für Version 4.0 und 4.5, Author: Stefan Hering
Title: Advances in Cryptology - CRYPTO '88: Proceedings / Edition 1, Author: Shafi Goldwasser
Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: Advances in Cryptology - CRYPTO '89: Proceedings, Author: Gilles Brassard
Title: Geometries, Codes and Cryptography, Author: G. Longo

Pagination Links