This is the "Cryptography" page of the "Computer Security" guide.
Alternate Page for Screenreader Users
Skip to Page Navigation
Skip to Page Content

Computer Security  

Last Updated: Aug 26, 2016 URL: http://libguides.library.ncat.edu/computersecurity Print Guide RSS Updates

Cryptography Print Page
  Search: 
 
 

Logging In

When logging in from off campus:

Use your username and password that you use to log into Blackboard or your email.

Quick Searches

  • Data Encryption acticles
    Results form the Guide to Computing Literature, produced by the Association for Computing Machinery.

Search for Articles

These databases are the top places to start searching for security topics:

  • ACM Digital Library
    Journal and newspaper articles and conference proceedings from the Association for Computing Machinery.
  • IEEE Xplore
    Full-text access to IEEE (Institute of Electrical and Electronics Engineers) transactions, journals, magazines and conference proceedings published since 1988. These include a wide range of topics in electrical, computer, and systems engineering.
 

Books to Check Out fro mthe Library

Computer security and cryptography
Call Number: A&T STACKS QA76.9.A25 K638 2007

Cryptanalytic attacks on RSA
Call Number: A&T STACKS QA76.9.A25 Y358 2008

Disappearing cryptography : information hiding : steganography & watermarking
Call Number: A&T STACKS TK5105.59 .W39 2009

Introduction to cryptography and network security
Call Number: A&T STACKS TK5105.59 .F672 2008

Introduction to modern cryptography
Call Number: A&T STACKS QA76.9.A25 K36 2008

Multimedia content encryption : techniques and applications
Call Number: A&T STACKS QA76.575 .L52 2009

New stream cipher designs : the eSTREAM finalists
Call Number: A&T STACKS QA76.9.A25 N486 2008

Primality testing and integer factorization in public-key cryptography
Call Number: A&T STACKS QA76.9.A25 Y36 2009

Description

Loading  Loading...

Tip