LEADER 01692nam 2200469 n 450 001 996387142203316 005 20221108063936.0 035 $a(CKB)1000000000618357 035 $a(EEBO)2248501003 035 $a(UnM)99831352 035 $a(UnM)9928293500971 035 $a(EXLCZ)991000000000618357 100 $a19951005d1687 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aPax vobis, or, Gospel and liberty: against ancient and modern papists. By E.G. preacher of the VVord$b[electronic resource] 205 $aThe second edition, corrected and amended. 210 $a[London? $cs.n.]$dPrinted, anno Dom. 1687 215 $a[12], 72, 69-90 p 300 $aE.G. = Evan Griffith. 300 $aPlace of publication conjectured by cataloger. 300 $aText continuous despite pagination. 300 $aGathered in sixes. 300 $aReproduction of the original in the Christ Church Library, Oxford. 330 $aeebo-0026 606 $aFreedom of religion$zEngland$vEarly works to 1800 606 $aChurch and state$zEngland$vEarly works to 1800 606 $aReformation$zEngland$vEarly works to 1800 606 $aDialogues, English$vEarly works to 1800 615 0$aFreedom of religion 615 0$aChurch and state 615 0$aReformation 615 0$aDialogues, English 700 $aGriffith$b Evan$cA.M., Minister of Alderly.$01001559 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996387142203316 996 $aPax vobis, or, Gospel and liberty: against ancient and modern papists. By E.G. preacher of the VVord$92402775 997 $aUNISA LEADER 02016nam 2200373 450 001 9910688209903321 005 20230629085356.0 035 $a(CKB)5400000000042589 035 $a(NjHacI)995400000000042589 035 $a(EXLCZ)995400000000042589 100 $a20230629d2020 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aComputer and Network Security /$fedited by Jaydip Sen, Sidra Mehtab 210 1$aLondon :$cIntechOpen,$d2020. 210 4$dİ2020 215 $a1 online resource (178 pages) 311 $a1-83880-856-6 320 $aIncludes bibliographical references and index. 330 $aIn the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning. 606 $aComputer security 615 0$aComputer security. 676 $a005.8 702 $aMehtab$b Sidra 702 $aSen$b Jaydip 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910688209903321 996 $aComputer and Network Security$92270955 997 $aUNINA