Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 379
- Història 221
- History 146
- Ciceró, Marc Tul·li 128
- Películas cinematográficas 124
- Filosofía 102
- Crítica e interpretación 59
- Òperes 52
- Arte 49
- Computer security 48
- Llibrets 48
- Security measures 47
- En el cine 45
- Crítica, Interpretació, Etc 41
- Education 41
- Taxation 40
- Arqueología 39
- Biografia 39
- Computer networks 39
- Law and legislation 39
- Anglès 38
- Crítica i interpretació 38
- Materiales 38
- Research 37
- Economic conditions 36
- Universidad Pontificia de Salamanca (España) 36
- Política 33
- Antiquities 32
- Descripcions i viatges 32
- Català 31
-
1021Publicado 2016Libro electrónico
-
1022Publicado 2018Libro electrónico
-
1023Publicado 2018“…I enthusiastically invite you to contribute to a Special Issue of the open-access journal Polymers, focusing on "Host-Guest Polymer Complexes", which I and two of my former PhD students, Drs. Alper Gurarslan and Ganesh Narayanan, are editing. …”
Libro electrónico -
1024
-
1025
-
1026
-
1027
-
1028
-
1029Publicado 2012Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto, Biblioteca de la Universidad Pontificia de Salamanca)Libro
-
1030
-
1031
-
1032Publicado 2018Tabla de Contenidos: “…Practice Questions -- Chapter 6: Hacking the Caesar Cipher with Brute-Force -- Source Code for the Caesar Cipher Hacker Program -- Sample Run of the Caesar Cipher Hacker Program -- Setting Up Variables -- Looping with the range() Function -- Decrypting the Message -- Using String Formatting to Display the Key and Decrypted Messages -- Summary -- Practice Question -- Chapter 7: Encrypting with the Transposition Cipher -- How the Transposition Cipher Works -- Source Code for the Transposition Cipher Encryption Program -- Sample Run of the Transposition Cipher Encryption Program -- Creating Your Own Functions with def Statements -- Passing the Key and Message As Arguments -- The List Data Type -- The Transposition Encryption Algorithm -- Augmented Assignment Operators -- Moving currentIndex Through the Message -- The join() String Method -- Return Values and return Statements -- The __name__ Variable -- Summary -- Practice Questions -- Chapter 8: Decrypting with the Transposition Cipher -- How to Decrypt with the Transposition Cipher on Paper -- Source Code for the Transposition Cipher Decryption Program -- Sample Run of the Transposition Cipher Decryption Program -- Importing Modules and Setting Up the main() Function -- Decrypting the Message with the Key -- Calling the main() Function -- Summary -- Practice Questions -- Chapter 9: Programming a Program to Test Your Program -- Source Code for the Transposition Cipher Tester Program -- Sample Run of the Transposition Cipher Tester Program -- Importing the Modules -- Creating Pseudorandom Numbers -- Creating a Random String -- Testing Each Message -- Checking Whether the Cipher Worked and Ending the Program -- Calling the main() Function -- Testing the Test Program -- Summary -- Practice Questions -- Chapter 10: Encrypting and Decrypting Files -- Plain Text Files…”
Libro electrónico -
1033Publicado 2022“…This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes--including 30 unbreakable methods…”
Libro electrónico -
1034Publicado 2022“…About the Book Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. …”
Grabación no musical -
1035
-
1036
-
1037por Coria-Caceres (Diócesis).Materias:
Publicado 2018Red de bibliotecas Iglesia Navarra (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Diocesana Bilbao, Biblioteca Diocesana de Salamanca)Libro -
1038
-
1039
-
1040