Zustand: Good. Used book that is in clean, average condition without any missing pages.
Anbieter: ThriftBooks-Reno, Reno, NV, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
EUR 27,61
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,800grams, ISBN:9781584886181.
Anbieter: Studibuch, Stuttgart, Deutschland
hardcover. Zustand: Gut. 392 Seiten; 9781584881278.3 Gewicht in Gramm: 1.
Anbieter: Mooney's bookstore, Den Helder, Niederlande
Zustand: Very good.
Zustand: Gut. Zustand: Gut | Seiten: 413 | Sprache: Englisch | Produktart: Bücher.
EUR 124,31
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Richard A. MollinContinuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complex.
Buch. Zustand: Neu. Neuware - Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout the text, this edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. The book also provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.