Shopping Cart Shopping Cart 0 items
info@oldcomputerbooks.com
Browse by Category

Cryptanalysis, Cryptology, Computer Security

Results for: category: [x] Cryptanalysis, Cryptology, Computer Security
Search within these results:
Showing: 1 - 16 (of 16)
Results per page:
Order by:
1.
ACM Computing Surveys complete year 1979, four individual issues, March, June, September, December, volume 11 nos. 1 through 4 inclusive. var ACM.

ACM Computing Surveys complete year 1979, four individual issues, March, June, September, December, volume 11 nos. 1 through 4 inclusive.

Item no. M889. ACM Computing Surveys, 1979, pp 1 - 413 inclusive, double-column text, illustrations, Index for 1979 at rear of December volume.
Price: $25.00
See Details
   
Add to Cart
2.
ACM Computing Surveys -- volume 13, numbers 1 through 4 inclusive, 1981 (four individual issues). Association for Computing Machinery.

ACM Computing Surveys -- volume 13, numbers 1 through 4 inclusive, 1981 (four individual issues).

Item no. B329. ACM 1981, 4 individual issues; pp 1 - 494 inclusive, with annual index at rear; double-column text, references.
Price: $15.00
See Details
   
Add to Cart
3.
ACM Computing Surveys, 4 individual issues, complete year 1983; Volume 15 nos. 1-4, March, June, September, December 1983. Association for Computing Machinery.

ACM Computing Surveys, 4 individual issues, complete year 1983; Volume 15 nos. 1-4, March, June, September, December 1983.

Item no. C3274. ACM, 1983, pp 1 -377 inclusive in 4 issues, double-column text, references, diagrams etc.
Price: $12.00
See Details
   
Add to Cart
4.
An Algorithm for the Machine Calculation of Complex Fourier Series, in , Mathematics of Computation vol 19 1965. James W. Cooley, Mathematics of Computation vol 19 1965 John W. Tukey.

An Algorithm for the Machine Calculation of Complex Fourier Series, in , Mathematics of Computation vol 19 1965.

Item no. K6279. Mathematics of Computation vol 19 1965.
Price: $150.00
See Details
   
Add to Cart
5.
Communications Architecture for Distributed Systems; the Systems Programming Series. R. J. Cypser.

Communications Architecture for Distributed Systems; the Systems Programming Series.

Item no. B327. Addison-Wesley MA 1978; ISBN 0201144581; 711 pages, index.
Price: $4.00
See Details
   
Add to Cart
6.
Nearer to the Dust -- copyright and the machine. George A. Gipe.

Nearer to the Dust -- copyright and the machine.

Item no. B145. The Williams & Wilkins Co, Baltimore MD 1967, first edition; 290 pages, index.
Price: $10.00
See Details
   
Add to Cart
7.
Catching Up with the Computer Revolution, Harvard Business Review Executive Book series. Harvard Business Review, Salerno.

Catching Up with the Computer Revolution, Harvard Business Review Executive Book series.

Item no. B299. HBR, Wiley NY 1983 first edition; 531 pages, index, some illustrations.
Price: $8.00
See Details
   
Add to Cart
8.
Soviet Cybernetics Review 1970 Historical survey of Soviet Computers, photographs etc. Wade Holland, , RAND, project RAND.

Soviet Cybernetics Review 1970 Historical survey of Soviet Computers, photographs etc.

Item no. C810959. volume 4 number 1 January 1970; 83 pages, double-column text, photographs, illustrations.
Price: $20.00
See Details
   
Add to Cart
9.
1984 Symposium on Security and Privacy, Proceedings, IEEE Computer Society. IEEE, various contributing authors.

1984 Symposium on Security and Privacy, Proceedings, IEEE Computer Society.

Item no. R164. IEEE Computer Society Calif. 1984, 227 pages, double-column text.
Price: $10.00
See Details
   
Add to Cart
10.
Seizing the Enigma -- the race to break the German U-boat Codes, 1939-1943. David Kahn.

Seizing the Enigma -- the race to break the German U-boat Codes, 1939-1943.

Item no. R226. Houghton-Mifflin Boston MA 1991, 336 pages, index, notes, bibliography, photographs.
Price: $8.00
See Details
   
Add to Cart
11.
Out of the Inner Circle, the true story of a computer intruder capable of cracking the nation's most secure computer system. Bill Landreth, aka 'The Cracker'.

Out of the Inner Circle, the true story of a computer intruder capable of cracking the nation's most secure computer system.

Item no. M687. Tempus, Microsoft Corp., Redmond WA 1985, 1989; 230 pages, index.
Price: $3.00
See Details
   
Add to Cart
12.
3 volumes SCEPTRE Support, Vol I revised User's Manual, Vol II Maintenance and Applications; Formulation, PREDICT support etc. Mathers, Sedore, Sents, IBM Electronics Systems Center.

3 volumes SCEPTRE Support, Vol I revised User's Manual, Vol II Maintenance and Applications; Formulation, PREDICT support etc.

Item no. R211. Technical Report, Air Force Weapons Lab., SCEPTRE Support.
Price: $30.00
See Details
   
Add to Cart
13.
Computer Networks, a Systems Approach. Larry Peterson, Bruce Davie.

Computer Networks, a Systems Approach.

Item no. C06197. Morgan Kauffman, SF Calif., 1996, 552 pages, indexappendices, diagrams.
Price: $10.00
See Details
   
Add to Cart
14.
Applied Cryptography -- Protocols, Algorithms, and Source Code in C. Bruce Schneier.

Applied Cryptography -- Protocols, Algorithms, and Source Code in C.

Item no. M551. John Wiley & Sons NY 1994; 618 pages, Index, references, some illustrations.
Price: $15.00
See Details
   
Add to Cart
15.
Effectiveness of error control in data communication over switched telephone network, Bell Telephone System Monograph 4887. R. L. Townsend, Bell Telephone System Technical Publications R N. Watts.

Effectiveness of error control in data communication over switched telephone network, Bell Telephone System Monograph 4887.

Item no. R186. Bell Telephone Laboratories NY issued February 1965, 28 pages, 8.5x11 monograph size, illus. diagrams.
Price: $8.00
See Details
   
Add to Cart
16.
Steal This Computer Book -- what THEY won't tell you about the Internet. Wallace Wang.

Steal This Computer Book -- what THEY won't tell you about the Internet.

Item no. M490. No Starch Press, San Francisco CA 1998; 340 pages, index, some illustrations.
Price: $6.00
See Details
   
Add to Cart