Publisher
Edition
At
0
ACM transactions on information and system security
Association for Computing Machinery,
c1998-
QA76.9.A25 A344
Online electronic
Not for loan
0
Contourlet transformation for data hiding /
Near East University,
2014
QA76.575 .Z44 2014
NEU Grand Library[Reserve Section] (2)
Available
11
Cryptography and network security :
principles and practice /
ISBN: 0131873164
Pearson/Prentice Hall,
c2006.
TK5105.59 .S73 2006
NEU Grand Library[General Collection] (3)
Available
1
Cryptography and network security :
principles and practice /
ISBN: 013705632X
Prentice Hall,
2011.
TK5105.59 .S713 2011
NEU Grand Library[General Collection]
Available
0
Cryptography and network security :
principles and practice /
ISBN: 0131115022
Prentice Hall,
2003.
TK5105.59 .S713 2003
NEU Grand Library[General Collection]
Available
0
Cryptography and security over network using data encryption standard /
Near East University,
2003.
QA76.9.A25 .M47 2003
NEU Grand Library[Reserve Section]
Available
0
Cryptonomicon /
ISBN: 0060512806
Avon Press,
2002.
PS3567.U57 .S74 2002
NEU Grand Library[American Corner]
Available
0
Embedded cryptographic hardware :
methodologies and architectures /
ISBN: 1594540128
Nova Science Publishers,
c2004.
TK5102.94 .E49 2004
NEU Grand Library[General Collection]
Available
0
Encryption & Message Security Of GSM /
Near East University,
2001.
TK5103.483 .R44 2001
NEU Grand Library[Reserve Section]
Available
7
In code :
a mathematical journey /
ISBN: 1861972717
Profile,
2001.
QA76.9.A25 .F53 2001
NEU Grand Library[General Collection]
Available