000421017 000__ 01169cam\a2200325\a\4500 000421017 001__ 421017 000421017 005__ 20210513145314.0 000421017 006__ m\\\\\\\\u\\\\\\\\ 000421017 007__ cr\cn||||||||| 000421017 008__ 090803s2003\\\\maua\\\\s\\\\\000\0\eng\d 000421017 035__ $$a(CaPaEBR)ebr10047383 000421017 035__ $$a(OCoLC)647288413 000421017 040__ $$aCaPaEBR$$cCaPaEBR 000421017 043__ $$an-us--- 000421017 05014 $$aQA76.9.A25$$bS43 2003eb 000421017 24500 $$aSecurity$$h[electronic resource] :$$bsecrets, intruders and ID tags. 000421017 260__ $$a[Boston] :$$bTechnology Research News,$$c2003. 000421017 300__ $$a51 p. :$$bill. 000421017 4900_ $$aTRN's making the future report ;$$vno. 6 (summer 2003) 000421017 506__ $$aAccess limited to authorized users. 000421017 650_0 $$aComputer security. 000421017 650_0 $$aComputer networks$$xSecurity measures. 000421017 650_0 $$aInternet$$xSecurity measures. 000421017 650_0 $$aCryptography. 000421017 650_0 $$aData encryption (Computer science) 000421017 650_0 $$aTechnology$$xResearch$$zUnited States. 000421017 655_7 $$aElectronic books.$$2lcsh 000421017 852__ $$bebk 000421017 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10047383$$zOnline Access 000421017 909CO $$ooai:library.usi.edu:421017$$pGLOBAL_SET 000421017 980__ $$aEBOOK 000421017 980__ $$aBIB 000421017 982__ $$aEbook 000421017 983__ $$aOnline