Cryptography's role in securing the information society
Sábháilte in:
Údar corparáideach: | ebrary, Inc |
---|---|
Rannpháirtithe: | Dam, Kenneth W., Lin, Herbert |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Washington, DC :
National Academy Press,
1996.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Quantum communication and security
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Secure communicating systems design, analysis, and implementation /
de réir: Huth, Michael, 1962-
Foilsithe / Cruthaithe: (2001)
de réir: Huth, Michael, 1962-
Foilsithe / Cruthaithe: (2001)
Contemporary cryptography
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2005)
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2005)
Disaster recovery planning for communications and critical infrastructure
de réir: Wrobel, Leo A. (Leo Anthony)
Foilsithe / Cruthaithe: (2009)
de réir: Wrobel, Leo A. (Leo Anthony)
Foilsithe / Cruthaithe: (2009)
Basics of contemporary cryptography for IT practitioners
de réir: Ryabko, Boris
Foilsithe / Cruthaithe: (2005)
de réir: Ryabko, Boris
Foilsithe / Cruthaithe: (2005)
Convergence : illicit networks and national security in the age of globalization /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Surveillance or security? the risks posed by new wiretapping technologies /
de réir: Landau, Susan Eva
Foilsithe / Cruthaithe: (2010)
de réir: Landau, Susan Eva
Foilsithe / Cruthaithe: (2010)
Online information review.
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Contemporary cryptography /
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2011)
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2011)
Security and privacy in mobile and wireless networking /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Cryptography for developers
de réir: St. Denis, Tom
Foilsithe / Cruthaithe: (2007)
de réir: St. Denis, Tom
Foilsithe / Cruthaithe: (2007)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
de réir: Omollo, Richard Otieno, et al.
Foilsithe / Cruthaithe: (2025)
de réir: Omollo, Richard Otieno, et al.
Foilsithe / Cruthaithe: (2025)
Coding and cryptography : synergy for a robust communication /
de réir: Živić, Nataša
Foilsithe / Cruthaithe: (2013)
de réir: Živić, Nataša
Foilsithe / Cruthaithe: (2013)
User's guide to cryptography and standards
de réir: Dent, Alexander W.
Foilsithe / Cruthaithe: (2005)
de réir: Dent, Alexander W.
Foilsithe / Cruthaithe: (2005)
Cryptography protocols, design and applications /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Quantum cryptography potentially perfect security.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
IBM eserver zSeries 990 (z990) cryptography implementation
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Electricity requirements for a digital society
de réir: Baer, Walter S.
Foilsithe / Cruthaithe: (2002)
de réir: Baer, Walter S.
Foilsithe / Cruthaithe: (2002)
An introduction to mathematical cryptography
de réir: Hoffstein, Jeffrey
Foilsithe / Cruthaithe: (2008)
de réir: Hoffstein, Jeffrey
Foilsithe / Cruthaithe: (2008)
Introduction to communication systems simulation
de réir: Schiff, Maurice, 1942-
Foilsithe / Cruthaithe: (2006)
de réir: Schiff, Maurice, 1942-
Foilsithe / Cruthaithe: (2006)
Security secrets, intruders and ID tags.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
PGP & GPG email for the practical paranoid /
de réir: Lucas, Michael, 1967-
Foilsithe / Cruthaithe: (2006)
de réir: Lucas, Michael, 1967-
Foilsithe / Cruthaithe: (2006)
Telecommunications and the computer.
de réir: Martin, James, 1933-
Foilsithe / Cruthaithe: (1969)
de réir: Martin, James, 1933-
Foilsithe / Cruthaithe: (1969)
Secure multi-party computation
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Identity-based cryptography
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Network nation inventing American telecommunications /
de réir: John, Richard R., 1959-
Foilsithe / Cruthaithe: (2010)
de réir: John, Richard R., 1959-
Foilsithe / Cruthaithe: (2010)
New telecom networks : enterprises and security /
de réir: Battu, Daniel
Foilsithe / Cruthaithe: (2014)
de réir: Battu, Daniel
Foilsithe / Cruthaithe: (2014)
Coded modulation systems
de réir: Anderson, John B., 1945-
Foilsithe / Cruthaithe: (2003)
de réir: Anderson, John B., 1945-
Foilsithe / Cruthaithe: (2003)
zSeries Trusted Key Entry (TKE) version 4.2 update
de réir: Kappeler, Patrick
Foilsithe / Cruthaithe: (2004)
de réir: Kappeler, Patrick
Foilsithe / Cruthaithe: (2004)
Boolean functions in cryptology and information security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Renewing U.S. telecommunications research
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Reconstruction of chaotic signals with applications to chaos-based communications
de réir: Feng, Jiu Chao
Foilsithe / Cruthaithe: (2008)
de réir: Feng, Jiu Chao
Foilsithe / Cruthaithe: (2008)
RabbitMQ essentials : hop straight into developing your own messaging applications by learning how to utilize RabbitMQ /
de réir: Dossot, David
Foilsithe / Cruthaithe: (2014)
de réir: Dossot, David
Foilsithe / Cruthaithe: (2014)
Behavioral modelling and predistortion of wideband wireless transmitters /
de réir: Ghannouchi, Fadhel M., 1958-, et al.
Foilsithe / Cruthaithe: (2015)
de réir: Ghannouchi, Fadhel M., 1958-, et al.
Foilsithe / Cruthaithe: (2015)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
de réir: Chandra, Praphul
Foilsithe / Cruthaithe: (2005)
de réir: Chandra, Praphul
Foilsithe / Cruthaithe: (2005)
Cryptography and network security : principles and practice /
de réir: Stallings, William
Foilsithe / Cruthaithe: (2006)
de réir: Stallings, William
Foilsithe / Cruthaithe: (2006)
The facts on file dictionary of telecomunications /
de réir: Graham, John
Foilsithe / Cruthaithe: (1991)
de réir: Graham, John
Foilsithe / Cruthaithe: (1991)
The facts on file dictionary of telecommunications /
de réir: Graham, John
Foilsithe / Cruthaithe: (1991)
de réir: Graham, John
Foilsithe / Cruthaithe: (1991)
Practical radio resource management in wireless systems
de réir: Kyriazakos, Sofoklis A., 1975-
Foilsithe / Cruthaithe: (2004)
de réir: Kyriazakos, Sofoklis A., 1975-
Foilsithe / Cruthaithe: (2004)
Practical VoIP Security
de réir: Porter, Thomas
Foilsithe / Cruthaithe: (2006)
de réir: Porter, Thomas
Foilsithe / Cruthaithe: (2006)
Míreanna comhchosúla
-
Quantum communication and security
Foilsithe / Cruthaithe: (2007) -
Secure communicating systems design, analysis, and implementation /
de réir: Huth, Michael, 1962-
Foilsithe / Cruthaithe: (2001) -
Contemporary cryptography
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2005) -
Disaster recovery planning for communications and critical infrastructure
de réir: Wrobel, Leo A. (Leo Anthony)
Foilsithe / Cruthaithe: (2009) -
Basics of contemporary cryptography for IT practitioners
de réir: Ryabko, Boris
Foilsithe / Cruthaithe: (2005)