Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
588 results found. Sorted by relevance | date | title .
Result Page     
Add All On Page to My List
Keywords (351-400 of 588)
351
EBOOK
2015
Security in computing
Pfleeger, Charles P., 1948- author.
Upper Saddle River, NJ : Prentice Hall, [2015]
Click for more information
No one has rated this material
352
EBOOK
2015
Group theoretic cryptography
González Vasco, Maria Isabel, author.
Boca Raton, FL : CRC Press LLC, [2015]
Click for more information
No one has rated this material
353
EBOOK
2015
Click for more information
No one has rated this material
356
EBOOK
2015
Applied cryptography : protocols, algorithms, and source code in C
Schneier, Bruce, 1963- author.
Indianapolis, IN : John Wiley & Sons, [2015]
Click for more information
No one has rated this material
357
EBOOK
2015
Infosec management fundamentals
Dalziel, Henry, author.
Waltham, MA : Elsevier : Syngress, [2015]
Click for more information
No one has rated this material
358
EBOOK
2015
Click for more information
No one has rated this material
359
EBOOK
2015
Click for more information
No one has rated this material
361
EBOOK
2015
The mobile application hacker's handbook
Chell, Dominic, author.
Indianapolis, IN : John Wiley & Sons, [2015]
Click for more information
No one has rated this material
362
EVIDEO
2015
porridge pulleys and Pi

[San Francisco, California, USA] : Kanopy Streaming, 2015.
Click for more information
No one has rated this material
363
EVIDEO
2015
What Is Decipherment?

[San Francisco, California, USA] : Kanopy Streaming, 2015.
Click for more information
No one has rated this material
364
EVIDEO
2014
Linux web operations LiveLessons : (sneak peek video training)
Whaley, Ben.
[Place of publication not identified] : Addison-Wesley Professional, 2014.
No one has rated this material
365
EBOOK
2014
Click for more information
No one has rated this material
366
EBOOK
2014
Quantum optics for engineers
Duarte, F. J. (Frank J.)
Boca Raton, FL : CRC Press, ©2014.
Click for more information
No one has rated this material
367
EBOOK
2014-
CISSP Training Kit.
Miller, David R., author.
Redmond : Microsoft Press 2014.
Click for more information
No one has rated this material
369
EBOOK
2014
The InfoSec handbook : an introduction to information security
Rao, Umesh Hodeghatta, author.
Berkeley, CA : ApressOpen, 2014.
Click for more information
No one has rated this material
370
EBOOK
2014
Click for more information
No one has rated this material
371
EBOOK
2014
CompTIA security+ (exam SY0-401)
Dunkerley, Dawn.
New York : McGraw-Hill Education, ©2014.
Click for more information
No one has rated this material
372
EBOOK
2014
Click for more information
No one has rated this material
373
EBOOK
2014
Click for more information
No one has rated this material
374
EBOOK
2014
Click for more information
No one has rated this material
375
EBOOK
2014
Information security : principles and practices
Merkow, Mark S.
Indianapolis, Ind. : Pearson Education, ©2014.
Click for more information
No one has rated this material
376
EBOOK
2014
Pro Windows 8.1 development with XAML and C#
Liberty, Jesse, author.
[Berkeley, California] : Apress, 2014.
Click for more information
No one has rated this material
377
EBOOK
2014
Click for more information
No one has rated this material
378
EBOOK
2014
Click for more information
No one has rated this material
379
EBOOK
2014
Click for more information
No one has rated this material
380
EBOOK
2014
Theory of computational complexity
Du, Dingzhu, author.
Hoboken, New Jersey : John Wiley & Sons, 2014.
Click for more information
No one has rated this material
382
BOOK
2014
Alan Turing : the enigma : the book that inspired the film The Imitation Game
Hodges, Andrew.
Princeton, [New Jersey] : Princeton University Press, [2014]
 
Location Call No. Status
 95th Street Adult Biography  BIO TURING    DUE 06-09-24
 Nichols Adult Biography  BIO TURING    AVAILABLE
Click for more information
No one has rated this material
383
EAUDIOBOOK
2013
Mathematics is power
Bloch, William Goldbloom.
[United States] : Recorded Books, Inc., 2013.
Click for more information
No one has rated this material
384
EAUDIOBOOK
2013
Speaking secret codes
Bell-Rehwoldt, Sheri.
[United States] : Capstone Press, 2013.
Click for more information
No one has rated this material
385
EBOOK
2013
Cryptography : cracking codes

New York, NY : Britannica Educational Publishing, In Association With Rosen Educational Services, 2013.
Click for more information
No one has rated this material
386
EBOOK
2013
Click for more information
No one has rated this material
387
EBOOK
2013
Click for more information
No one has rated this material
388
EBOOK
2013
Cryptography : Infosec pro guide
Oriyano, Sean-Philip.
New York : McGraw-Hill Education, ©2013.
Click for more information
No one has rated this material
389
EBOOK
2013
Information theory : coding and cryptography
Saha, A. (Arjit)
New Delhi : Dorling Kindersley (India), ©2013.
Click for more information
No one has rated this material
390
EBOOK
2013
Pearl Harbor revisited : United States Navy communications intelligence, 1924-1941
Parker, Frederick D., author.
Fort George G. Meade, Md. : Center for Cryptologic History, National Security Agency, 2013.
Click for more information
No one has rated this material
391
EBOOK
2013
Masked dispatches : cryptograms and cryptology in American history, 1775-1900
Weber, Ralph E. (Ralph Edward), 1926- author.
[Fort George G. Meade, MD] : Center for Cryptologic History, National Security Agency, 2013.
No one has rated this material
392
EBOOK
2013
Sharing the burden : women in cryptology during World War II
Wilcox, Jennifer E., author.
Fort George G. Meade, Md. : Center for Cryptologic History, National Security Agency, reprinted 2013.
No one has rated this material
393
EBOOK
2013
CISSP Cert Guide
McMillan, Troy, author.
Pearson IT Certification, 2013.
Click for more information
No one has rated this material
394
EBOOK
2013
Information security management principles
Alexander, David (Information security practitioner)
Swindon, U.K. : BCS Learning & Development Ltd., 2013.
Click for more information
No one has rated this material
395
EBOOK
2013
Click for more information
No one has rated this material
396
EBOOK
2013
Click for more information
No one has rated this material
397
EBOOK
2013
Node.js recipes
Gackenheimer, Cory, author.
Berkeley, CA : Apress, ©2013.
Click for more information
No one has rated this material
398
EAUDIOBOOK
2012
Click for more information
No one has rated this material
399
BOOK
2012
Nine algorithms that changed the future : the ingenious ideas that drive today's computers
MacCormick, John, 1972-
Princeton, N.J. : Princeton University Press, 2012.
 
Location Call No. Status
 Nichols Adult Nonfiction  006.3 MAC 2012    AVAILABLE
Click for more information
No one has rated this material
400
BOOK
2012
Spy codes and ciphers
Mitchell, Susan K.
Berkeley Heights, NJ : Enslow Publishers, [2012]
 
Location Call No. Status
 95th Street Juvenile Nonfiction  J 652.8 MIT    AVAILABLE
 Naper Blvd. Juvenile Nonfiction  J 652.8 MIT    AVAILABLE
Click for more information
No one has rated this material
locate in results
More Information
Find another book like this Cryptography. at Novelist
Result Page