Ochrona informacji w sieciach komputerowych
red. Urbanowicz, Paweł

Publication year: 2004 Call number: [004.7] Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Bezpieczeństwo systemów informatycznych
author Januszewicz, Jerzy

Publication year: 2009 Call number: [004.78] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Internet w społeczeństwie informacyjnym
red. Grzywak, Andrzej

Publication year: 2003 Call number: [004.7] Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Wojna informacyjna i bezpieczeństwo informacji
author Denning, Dorothy E.

Publication year: 2002 Call number: [004] Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Wojna informacyjna i bezpieczeństwo informacji /
author Denning, Dorothy E.

Publication year: 2002 Call number: [II] Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Podstawy kryptografii
author Karbowski, Marcin

Publication year: 2008 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Inżynieria zabezpieczeń
author Ross, Anderson

Publication year: 2005 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Bezpieczeństwo danych w systemach informatycznych
author Stokłosa, Janusz

Publication year: 2001 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Sekrety kryptografii
author Bauer, Friedrich L.

Publication year: 2003 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Kryptografia : w teorii i w praktyce 
author Stinson, Douglas R.

Publication year: 2005 Call number: [13.A] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Internet w społeczeństwie europejskim
author Grzywak, Andrzej

Publication year: 2003 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Kryptografia w C i C++
author Welschenbach, Michael

Publication year: 2002 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Bezpieczeństwo systemów informatycznych zarządzania
author Barczak, Andrzej

Publication year: 2003 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Podstawy kryptografii
author Karbowski, Marcin

Publication year: 2006 Call number: [13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Algorytmy bez tajemnic /
author Cormen, H. Thomas.

Publication year: 2013 Call number: [004] Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Podstawy kryptografii /
author Karbowski, Marcin.

Publication year: 2014 Call number: [004] Available: (0); Checked out: (1); Not for loan: (1); Actions: Place hold Add to cart

Practical Cryptography /
author Ferguson, Niels.

Publication year: 2003 Call number: [004] Available: (0); Checked out: (0); Not for loan: (1); Actions: Add to cart

Kryptografia w praktyce /
author Ferguson, Niels.

Publication year: 2004 Call number: [004] Series: Kanon Informatyki Available: (0); Checked out: (1); Not for loan: (1); Actions: Place hold Add to cart

Wprowadzenie do kryptografii /
author Buchmann, Johannes A.

Publication year: 2006 Call number: [004] Series: Informatyka - Zastosowania Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Kryptografia dla praktyków : protokoły, algorytmy i programy źródłowe w języku C / 
author Schneier, Bruce

Publication year: 2002 Call number: [004] Series: TAO Tajemnica, Atak, Obrona Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Kryptografia i bezpieczeństwo sieci komputerowych : koncepcje i metody bezpiecznej komunikacji / 
author Stallings, William.

Publication year: 2012 Call number: [VIII] Available: (0); Checked out: (0); Not for loan: (1); Actions: Add to cart

Podpisy elektroniczne, biometria, identyfikacja elektroniczna : elektroniczny obrót prawny w społeczeństwie cyfrowym / 
author Marucha-Jaworska, Magdalena.

Publication year: 2015 Call number: [03.0] Series: LEX a Wolters Kluwer business Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Kryptografia : w teorii i w praktyce / 
author Stinson, Douglas R.

Publication year: 2005 Call number: [004] Series: Tajemnica-atak-obrona TAO Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Sieci komputerowe : wydanie V /
Autor Tanenbaum, Andrew S.

Publication year: 2012 Available: (0); Checked out: (1); Not for loan: (0); Actions: Place hold Add to cart

Kryptografia : teoria i praktyka zabezpieczenia systemów komputerowych / 
author Kutyłowski, Mirosław

Publication year: 1999 Call number: [II] Series: Seria z Kluczem Available: (0); Checked out: (0); Not for loan: (1); Actions: Add to cart

Transakcje i monety internetowe : kryptologia a biznes - bezpieczeństwo stosowane / 
 

Publication year: 2014 Call number: [004] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Bezpieczeństwo danych w systemach informatycznych /
author Stokłosa, Janusz.

Publication year: 2001 Call number: [004] Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Podstawy kryptografii /
author Karbowski, Marcin.

Publication year: 2014 Call number: [II] Available: (0); Checked out: (0); Not for loan: (1); Actions: Add to cart

Wykład z teorii liczb i kryptografii /
author Koblitz, Neal

Publication year: 2006 Call number: [VIII] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Internet : cloud computing, przetwarzanie w chmurach = Cloud computing, data processing in the clouds / 
 

Publication year: 2013 Available: (0); Checked out: (1); Not for loan: (0); Actions: Place hold Add to cart

Nowoczesna kryptografia : praktyczne wprowadzenie do szyfrowania / 
Autor Aumasson, Jean-Philippe

Publication year: 2018 Available: (0); Checked out: (1); Not for loan: (0); Actions: Place hold Add to cart

Bezpieczeństwo systemów informatycznych : zasady i praktyka. T. 1 / 
Autor Stallings, William

Publication year: 2019 Available: (0); Checked out: (1); Not for loan: (0); Actions: Place hold Add to cart

Bezpieczeństwo systemów informatycznych, T.1 : zasady i praktyka. 
author Stallings, William

Publication year: 2019 Call number: [VIII] Available: (0); Checked out: (0); Not for loan: (1); Actions: Add to cart

Bezpieczeństwo systemów informatycznych, T.2 : zasady i praktyka / 
author Stallings, William

Publication year: 2019 Call number: [VIII] Available: (0); Checked out: (0); Not for loan: (1); Actions: Add to cart

Cryptography : a Very Short Introduction / 
Autor Piper, Fred

Publication year: 2002 Call number: [A/13.D] Available: (1); Checked out: (0); Not for loan: (0); Actions: Add to cart

Sieci komputerowe /
Autor Tanenbaum, Andrew S.

Publication year: 2012 Call number: [004.7] Available: (1); Checked out: (0); Not for loan: (1); Actions: Add to cart

Languages: