Cryptography's role in securing the information society
Guardat en:
Autor corporatiu: | ebrary, Inc |
---|---|
Altres autors: | Dam, Kenneth W., Lin, Herbert |
Format: | Electrònic eBook |
Idioma: | anglès |
Publicat: |
Washington, DC :
National Academy Press,
1996.
|
Matèries: | |
Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars
Quantum communication and security
Publicat: (2007)
Publicat: (2007)
Secure communicating systems design, analysis, and implementation /
per: Huth, Michael, 1962-
Publicat: (2001)
per: Huth, Michael, 1962-
Publicat: (2001)
Contemporary cryptography
per: Oppliger, Rolf
Publicat: (2005)
per: Oppliger, Rolf
Publicat: (2005)
Disaster recovery planning for communications and critical infrastructure
per: Wrobel, Leo A. (Leo Anthony)
Publicat: (2009)
per: Wrobel, Leo A. (Leo Anthony)
Publicat: (2009)
Basics of contemporary cryptography for IT practitioners
per: Ryabko, Boris
Publicat: (2005)
per: Ryabko, Boris
Publicat: (2005)
Convergence : illicit networks and national security in the age of globalization /
Publicat: (2013)
Publicat: (2013)
Surveillance or security? the risks posed by new wiretapping technologies /
per: Landau, Susan Eva
Publicat: (2010)
per: Landau, Susan Eva
Publicat: (2010)
Online information review.
Publicat: (2007)
Publicat: (2007)
Contemporary cryptography /
per: Oppliger, Rolf
Publicat: (2011)
per: Oppliger, Rolf
Publicat: (2011)
Security and privacy in mobile and wireless networking /
Publicat: (2009)
Publicat: (2009)
Cryptography for developers
per: St. Denis, Tom
Publicat: (2007)
per: St. Denis, Tom
Publicat: (2007)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
per: Omollo, Richard Otieno, et al.
Publicat: (2025)
per: Omollo, Richard Otieno, et al.
Publicat: (2025)
User's guide to cryptography and standards
per: Dent, Alexander W.
Publicat: (2005)
per: Dent, Alexander W.
Publicat: (2005)
Coding and cryptography : synergy for a robust communication /
per: Živić, Nataša
Publicat: (2013)
per: Živić, Nataša
Publicat: (2013)
Cryptography protocols, design and applications /
Publicat: (2012)
Publicat: (2012)
Quantum cryptography potentially perfect security.
Publicat: (2003)
Publicat: (2003)
Electricity requirements for a digital society
per: Baer, Walter S.
Publicat: (2002)
per: Baer, Walter S.
Publicat: (2002)
IBM eserver zSeries 990 (z990) cryptography implementation
Publicat: (2004)
Publicat: (2004)
An introduction to mathematical cryptography
per: Hoffstein, Jeffrey
Publicat: (2008)
per: Hoffstein, Jeffrey
Publicat: (2008)
Introduction to communication systems simulation
per: Schiff, Maurice, 1942-
Publicat: (2006)
per: Schiff, Maurice, 1942-
Publicat: (2006)
Security secrets, intruders and ID tags.
Publicat: (2003)
Publicat: (2003)
PGP & GPG email for the practical paranoid /
per: Lucas, Michael, 1967-
Publicat: (2006)
per: Lucas, Michael, 1967-
Publicat: (2006)
Telecommunications and the computer.
per: Martin, James, 1933-
Publicat: (1969)
per: Martin, James, 1933-
Publicat: (1969)
Secure multi-party computation
Publicat: (2013)
Publicat: (2013)
Identity-based cryptography
Publicat: (2009)
Publicat: (2009)
Network nation inventing American telecommunications /
per: John, Richard R., 1959-
Publicat: (2010)
per: John, Richard R., 1959-
Publicat: (2010)
New telecom networks : enterprises and security /
per: Battu, Daniel
Publicat: (2014)
per: Battu, Daniel
Publicat: (2014)
Coded modulation systems
per: Anderson, John B., 1945-
Publicat: (2003)
per: Anderson, John B., 1945-
Publicat: (2003)
zSeries Trusted Key Entry (TKE) version 4.2 update
per: Kappeler, Patrick
Publicat: (2004)
per: Kappeler, Patrick
Publicat: (2004)
Boolean functions in cryptology and information security
Publicat: (2008)
Publicat: (2008)
Renewing U.S. telecommunications research
Publicat: (2006)
Publicat: (2006)
RabbitMQ essentials : hop straight into developing your own messaging applications by learning how to utilize RabbitMQ /
per: Dossot, David
Publicat: (2014)
per: Dossot, David
Publicat: (2014)
Reconstruction of chaotic signals with applications to chaos-based communications
per: Feng, Jiu Chao
Publicat: (2008)
per: Feng, Jiu Chao
Publicat: (2008)
Behavioral modelling and predistortion of wideband wireless transmitters /
per: Ghannouchi, Fadhel M., 1958-, et al.
Publicat: (2015)
per: Ghannouchi, Fadhel M., 1958-, et al.
Publicat: (2015)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
per: Chandra, Praphul
Publicat: (2005)
per: Chandra, Praphul
Publicat: (2005)
The facts on file dictionary of telecommunications /
per: Graham, John
Publicat: (1991)
per: Graham, John
Publicat: (1991)
The facts on file dictionary of telecomunications /
per: Graham, John
Publicat: (1991)
per: Graham, John
Publicat: (1991)
Cryptography and network security : principles and practice /
per: Stallings, William
Publicat: (2006)
per: Stallings, William
Publicat: (2006)
Practical radio resource management in wireless systems
per: Kyriazakos, Sofoklis A., 1975-
Publicat: (2004)
per: Kyriazakos, Sofoklis A., 1975-
Publicat: (2004)
Practical VoIP Security
per: Porter, Thomas
Publicat: (2006)
per: Porter, Thomas
Publicat: (2006)
Ítems similars
-
Quantum communication and security
Publicat: (2007) -
Secure communicating systems design, analysis, and implementation /
per: Huth, Michael, 1962-
Publicat: (2001) -
Contemporary cryptography
per: Oppliger, Rolf
Publicat: (2005) -
Disaster recovery planning for communications and critical infrastructure
per: Wrobel, Leo A. (Leo Anthony)
Publicat: (2009) -
Basics of contemporary cryptography for IT practitioners
per: Ryabko, Boris
Publicat: (2005)