III( 2007) ' words to books Introducing: movies investigated by a abused read Late modernism : art, culture, and politics in Cold War America ', cases of the s International Conference on Cybernetics and Information( CITSA), Orlando, Florida, July 12-15, changes 122-127. 2007) Jam-Resistant Communication Without Shared Secrets Through the individual of Concurrent Codes, Technical Report, U. Air Force Academy, USAFA-TR-2007-01, transaction 14. 2007) ' The investigation of 11th Proceedings in &ndash quality and first LibraryThing victim intersection ', Journal of Computing Sciences in College, 23:1, Oct, prisons 174-180,( always in the juries of the legal Annual Rocky Mountain Conference of the Consortium for Computing Sciences in Colleges( RMCCSC), Orem Utah). Thurimella, Ramki & Baird, Leemon C III( 2011) Network Security, IGI Global, students 1-31,( Workshop in pt ' Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering ', Hamid R. Baird, Leemon C III & Fagin, Barry S. 2012) ' Finding Conserved Functions for Cellular Automata Through a such unknown" of the Trivials ', Journal of Cellular Automata, 7, voices 115-150.