Introduction
By William Stevenson
HTML | In the Digital Library
Tags: Coding theory, Computational complexity and cryptography, Computer crime, Cryptography, Data encryption, Document types, Information theory, Mathematical foundations of cryptography, Number-theoretic computations, Operating systems security, Security and privacy