<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'su:{ Crptography}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Crptography%7D&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Crptography%7D&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{ Crptography}' at Delhi University Library System]]> </description> <opensearch:totalResults>5</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Crptography%7D&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257B%2520Crptography%257D" startPage="" /> <item> <title> Crptography and network security </title> <dc:identifier>ISBN:9780070660465 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30394</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0070660468.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Forouzan Behrouz A.<br /> New Delhi Tata McGraw Hill Education Private Limited 2008 .<br /> xxvi, 721p. , Glossary 687-706p.; References 707-708p.; Index 709-721p. cm..<br /> 9780070660465 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30394">Place hold on <em>Crptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30394</guid> </item> <item> <title> Crptography and network security </title> <dc:identifier>ISBN:9780070648234 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30363</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0070648239.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kahate Atul.<br /> New Delhi Tata McGraw-Hill Company Limited 2008 .<br /> xxvi, 541p. , Appendix A-F, 507-532p.; References 533-534p.; Index 535-541p. cm..<br /> 9780070648234 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30363">Place hold on <em>Crptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30363</guid> </item> <item> <title> Cryptanalysis of RSA and its variants </title> <dc:identifier>ISBN:9781420075182 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28001</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1420075187.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Hinek M Jason.<br /> Boca Raton CRC Pres 2010 .<br /> xviii, 268p. , Includes bibliographical references.; Appendix A-C, 233-240p.; Bibliography 243-264p.; Index 265-268p. cm..<br /> 9781420075182 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28001">Place hold on <em>Cryptanalysis of RSA and its variants</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28001</guid> </item> <item> <title> Cryptographic boolean functions and applications </title> <dc:identifier>ISBN:9780123748904 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=21622</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0123748909.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Cusick Thomas W.<br /> Amsterdam Elsevier 2009 .<br /> xi, 232p. , References 209-228p.; Index 229-232p. cm..<br /> 9780123748904 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=21622">Place hold on <em>Cryptographic boolean functions and applications</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=21622</guid> </item> <item> <title> Number theory in science and communication with applications in crptography, physics, Digital information, computing and self-similarity </title> <dc:identifier>ISBN:9783540852971 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=29971</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/3540852972.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Schroeder Manfred.<br /> Berlin Springer 2009 .<br /> xxiv, 431p. , Glossary 405- 408p.; References 409- 418p.; Index 419- 431p. cm..<br /> 9783540852971 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=29971">Place hold on <em>Number theory in science and communication with applications in crptography, physics, Digital information, computing and self-similarity</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=29971</guid> </item> </channel> </rss>
