tcaep.co.uk Navigation. See bottom for text alternatives
In association with amazon.com

New on TCAEP

Download

Bookshop

Talk TCAEP

About TCAEP

Sources

Copyright
Search Now:
In Association with Amazon.com
Bookshop
in association with amazon.com

TCAEP.co.uk Bookshop > Computers & Internet > Programming > Algorithms > Cryptography
 
The Code Book : The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
by Simon Singh
Buy this book
 

 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
by Bruce Schneier
Buy this book
 

 
Understanding the Public-Key Infrastructure (Macmillan Technology Series)
by Carlisle Adams, Steve Lloyd
Buy this book
 

 
Java Security
by Scott Oaks
Buy this book
 

 
Cryptography and Network Security: Principles and Practice
by William Stallings
Buy this book
 

 
Building Linux and Openbsd Firewalls
by Wes Sonnenreich, Tom Yates
Buy this book
 

 
Cryptography : Theory and Practice (Discrete Mathematics and Its Applications)
by Douglas R. Stinson
Buy this book
 

 
Handbook of Applied Cryptography (CRC Press Series on Discrete Mathematics and Its Applications)
by Alfred J. Menezes, et al
Buy this book
 

 
Implementing Elliptic Curve Cryptography
by Michael Rosing
Buy this book
 

 
Kerberos: A Network Authentication System
by Brian Tung
Buy this book
 

 
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
by Electronic Frontier Foundation, John Gilmore (Editor)
Buy this book
 

 
Internet Cryptography
by Richard E. Smith
Buy this book
 

 
Java Cryptography
by Jonathan Knudsen
Buy this book
 

 
Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves
by Randall K. Nichols, et al
Buy this book
 

 
Cisco Access Lists Field Guide (McGraw-Hill Technical Expert Series)
by Gilbert Held(Editor), Kent Hundley
Buy this book
 

 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
by Bruce Schneier
Buy this book
 

 
The Official Pgp User's Guide
by Philip R. Zimmermann
Buy this book
 

 
Decrypted Secrets : Methods and Maxims of Cryptology
by Friedrich L. Bauer
Buy this book
 

 
Elliptic Curves in Cryptography
by G. Seroussi, et al
Buy this book
 

 
ICSA Guide to Cryptography
by Randall K. Nichols
Buy this book
 

 
Internet Security for Business
by Terry Bernstein(Editor), et al
Buy this book
 

 
Pki Essentials : Planning and Implementing Digital Certificate Systems
by Tom Austin, et al
Buy this book
 

 
Algebraic Aspects of Cryptography (Algorithms and Computation in Mathematics, Vol 3)
by Neal I. Koblitz
Buy this book
 

 
Smart Card Security and Applications (Artech House Telecommunications Library)
by Mike Hendry
Buy this book
 

 
The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance
by Bruce Schneier, David Banisar
Buy this book
 

 

[ H O M E ] [ S C I E N C E ] [ M A T H S ] [ A S T R O N O M Y ]
[ Download ] [ Shop ] [ Contact ] [ About ]
 
Page compiled: Fri Aug 10 18:45:34 GMT+01:00 2001
 
The Bottom Line
Home Science Maths Astronomy Download Bookshop Contact About Top of Page