Data encryption (Computer science)See also what's at Wikipedia, your library, or elsewhere.
Broader term:Related term:Narrower terms:Used for:- Data encoding (Computer science)
- Encryption of data (Computer science)
- Encryption
|
Filed under: Data encryption (Computer science)
Filed under: Data encryption (Computer science) -- Law and legislation
Filed under: Data encryption (Computer science) -- Law and legislation -- Great Britain
Filed under: Digital signatures -- Law and legislation -- Great BritainFiled under: Data encryption (Computer science) -- Law and legislation -- United StatesFiled under: Digital signatures -- Law and legislationFiled under: Data encryption (Computer science) -- Research
Filed under: Data encryption (Computer science) -- Research -- PeriodicalsFiled under: Data encryption (Computer science) -- United States Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
Items below (if any) are from related and broader terms.
Filed under: Cryptography Military Cryptanalysis (4 volumes originally issued 1938-1941; declassified version published 2005), by William F. Friedman (PDF files at nsa.gov) Mathematics and Computation: A Theory Revolutionizing Technology and Science (prepublication version, c2019), by Avi Wigderson (PDF with commentary at ias.edu) Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu) Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites) Cryptography's Role in Securing the Information Society (prepublication copy), ed. by Kenneth Dam and Herbert Lin (HTML and page images at NAP) Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com) The Mathematical and Philosophical Works Of the Right Reverend John Wilkins (London: Printed for J. Nicholson, 1708), by John Wilkins (page images at Google)
Filed under: Cryptography -- BibliographyFiled under: Cryptography -- Handbooks, manuals, etc.
Filed under: Cryptography -- Military aspects -- Handbooks, manuals, etc.Filed under: Cryptography -- Textbooks
Filed under: Cryptography -- United States -- Automation -- History It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis, 1930s-1960s (originally published by NSA Center for Cryptologic History, 2002; redacted declassified version released 2013), by Colin B. Burke Filed under: Cryptography -- United States -- History
Filed under: Cryptography -- United States -- History -- 20th centuryFiled under: Cryptography -- United States -- History -- Sources
Filed under: Indian code talkers Code Talkers: Hearing Before the Committee on Indian Affairs, United States Senate, One Hundred Eighth Congress, Second Session, on Contributions of Native American Code Talkers in American Military History (Washington: GPO, 2004), by United States Senate Committee on Indian Affairs Filed under: Cryptography in literatureFiled under: Korean War, 1950-1953 -- CryptographyFiled under: Poe, Edgar Allan, 1809-1849 -- Knowledge -- Cryptography
Filed under: Vietnam War, 1961-1975 -- Cryptography -- HistoryFiled under: World War, 1914-1918 -- Cryptography Code Talkers: Hearing Before the Committee on Indian Affairs, United States Senate, One Hundred Eighth Congress, Second Session, on Contributions of Native American Code Talkers in American Military History (Washington: GPO, 2004), by United States Senate Committee on Indian Affairs Filed under: World War, 1939-1945 -- Cryptography Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust, 1939-1945 (second edition; Fort George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2005), by Robert J. Hanyok (PDF at nsa.gov) Code Talkers: Hearing Before the Committee on Indian Affairs, United States Senate, One Hundred Eighth Congress, Second Session, on Contributions of Native American Code Talkers in American Military History (Washington: GPO, 2004), by United States Senate Committee on Indian Affairs The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet (originally published 1997; open access edition Baltimore: Johns Hopkins University Press, 2019), by Shawn Rosenheim (HTML and PDF files with commentary at Project MUSE)
Filed under: Computer security Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net) The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink) UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink) Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK) Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment (Berkeley: APress Open, c2020), by Daniel J. Blum (PDF with commentary at OAPEN) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org) The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com) Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com) Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com) For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
More items available under broader and related terms at left. |