Selected Files Containing Figures for
Information Security Intelligence: Cryptographic Principles & Applications


This section of the website provides readers with access to key figures from the text Information Security Intelligence: Cryptographic Principles & Applications. The author encourages instructors to also consult both the teachers guide and the CD-ROM which accompanies the text for further presentation materials.


Figure 1-5 Figure 2-5 Figure 3-1
Figure 4-3 Figure 5-3 Figure 7-3
Figure 8-15 Figure 9-8 Figure 10-1
Figure 11-10

The following section provides examples of encryption algorithms.

Image Gallery: Assorted pictures of Contributors.


All figures are the property of Delmar Thomson Publishing and cannot be reproduced without their permission.