Searching Books & More : "Computer security"

Dodson, Donna F X
5 results found in Books & More
RSS
Cover images provided by Open Library

Cryptographic algorithms and key sizes for personal identity verification

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Cryptographic algorithms and key sizes for Personal Identity Verification

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2006]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Cryptographic algorithms and key sizes for Personal Identity Verification

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Cryptographic algorithms and key sizes for Personal Identity Verification

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Electronic authentication guideline recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008]
Format: Electronic Resource, Remote
Retrieving Holdings Information