Cryptography's role in securing the information society
Shranjeno v:
Korporativna značnica: | ebrary, Inc |
---|---|
Drugi avtorji: | Dam, Kenneth W., Lin, Herbert |
Format: | Elektronski eKnjiga |
Jezik: | angleščina |
Izdano: |
Washington, DC :
National Academy Press,
1996.
|
Teme: | |
Online dostop: | An electronic book accessible through the World Wide Web; click to view |
Oznake: |
Označite
Brez oznak, prvi označite!
|
Podobne knjige/članki
Quantum communication and security
Izdano: (2007)
Izdano: (2007)
Secure communicating systems design, analysis, and implementation /
od: Huth, Michael, 1962-
Izdano: (2001)
od: Huth, Michael, 1962-
Izdano: (2001)
Contemporary cryptography
od: Oppliger, Rolf
Izdano: (2005)
od: Oppliger, Rolf
Izdano: (2005)
Disaster recovery planning for communications and critical infrastructure
od: Wrobel, Leo A. (Leo Anthony)
Izdano: (2009)
od: Wrobel, Leo A. (Leo Anthony)
Izdano: (2009)
Basics of contemporary cryptography for IT practitioners
od: Ryabko, Boris
Izdano: (2005)
od: Ryabko, Boris
Izdano: (2005)
Convergence : illicit networks and national security in the age of globalization /
Izdano: (2013)
Izdano: (2013)
Surveillance or security? the risks posed by new wiretapping technologies /
od: Landau, Susan Eva
Izdano: (2010)
od: Landau, Susan Eva
Izdano: (2010)
Online information review.
Izdano: (2007)
Izdano: (2007)
Contemporary cryptography /
od: Oppliger, Rolf
Izdano: (2011)
od: Oppliger, Rolf
Izdano: (2011)
Security and privacy in mobile and wireless networking /
Izdano: (2009)
Izdano: (2009)
Cryptography for developers
od: St. Denis, Tom
Izdano: (2007)
od: St. Denis, Tom
Izdano: (2007)
Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
od: Omollo, Richard Otieno, et al.
Izdano: (2025)
od: Omollo, Richard Otieno, et al.
Izdano: (2025)
Coding and cryptography : synergy for a robust communication /
od: Živić, Nataša
Izdano: (2013)
od: Živić, Nataša
Izdano: (2013)
User's guide to cryptography and standards
od: Dent, Alexander W.
Izdano: (2005)
od: Dent, Alexander W.
Izdano: (2005)
Cryptography protocols, design and applications /
Izdano: (2012)
Izdano: (2012)
Quantum cryptography potentially perfect security.
Izdano: (2003)
Izdano: (2003)
IBM eserver zSeries 990 (z990) cryptography implementation
Izdano: (2004)
Izdano: (2004)
Electricity requirements for a digital society
od: Baer, Walter S.
Izdano: (2002)
od: Baer, Walter S.
Izdano: (2002)
An introduction to mathematical cryptography
od: Hoffstein, Jeffrey
Izdano: (2008)
od: Hoffstein, Jeffrey
Izdano: (2008)
Introduction to communication systems simulation
od: Schiff, Maurice, 1942-
Izdano: (2006)
od: Schiff, Maurice, 1942-
Izdano: (2006)
Security secrets, intruders and ID tags.
Izdano: (2003)
Izdano: (2003)
PGP & GPG email for the practical paranoid /
od: Lucas, Michael, 1967-
Izdano: (2006)
od: Lucas, Michael, 1967-
Izdano: (2006)
Telecommunications and the computer.
od: Martin, James, 1933-
Izdano: (1969)
od: Martin, James, 1933-
Izdano: (1969)
Secure multi-party computation
Izdano: (2013)
Izdano: (2013)
Identity-based cryptography
Izdano: (2009)
Izdano: (2009)
Network nation inventing American telecommunications /
od: John, Richard R., 1959-
Izdano: (2010)
od: John, Richard R., 1959-
Izdano: (2010)
New telecom networks : enterprises and security /
od: Battu, Daniel
Izdano: (2014)
od: Battu, Daniel
Izdano: (2014)
Coded modulation systems
od: Anderson, John B., 1945-
Izdano: (2003)
od: Anderson, John B., 1945-
Izdano: (2003)
zSeries Trusted Key Entry (TKE) version 4.2 update
od: Kappeler, Patrick
Izdano: (2004)
od: Kappeler, Patrick
Izdano: (2004)
Boolean functions in cryptology and information security
Izdano: (2008)
Izdano: (2008)
Reconstruction of chaotic signals with applications to chaos-based communications
od: Feng, Jiu Chao
Izdano: (2008)
od: Feng, Jiu Chao
Izdano: (2008)
RabbitMQ essentials : hop straight into developing your own messaging applications by learning how to utilize RabbitMQ /
od: Dossot, David
Izdano: (2014)
od: Dossot, David
Izdano: (2014)
Renewing U.S. telecommunications research
Izdano: (2006)
Izdano: (2006)
Behavioral modelling and predistortion of wideband wireless transmitters /
od: Ghannouchi, Fadhel M., 1958-, et al.
Izdano: (2015)
od: Ghannouchi, Fadhel M., 1958-, et al.
Izdano: (2015)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
od: Chandra, Praphul
Izdano: (2005)
od: Chandra, Praphul
Izdano: (2005)
The facts on file dictionary of telecomunications /
od: Graham, John
Izdano: (1991)
od: Graham, John
Izdano: (1991)
The facts on file dictionary of telecommunications /
od: Graham, John
Izdano: (1991)
od: Graham, John
Izdano: (1991)
Cryptography and network security : principles and practice /
od: Stallings, William
Izdano: (2006)
od: Stallings, William
Izdano: (2006)
Practical radio resource management in wireless systems
od: Kyriazakos, Sofoklis A., 1975-
Izdano: (2004)
od: Kyriazakos, Sofoklis A., 1975-
Izdano: (2004)
Near-capacity variable length coding regular and EXIT-chart aided irregular designs /
Izdano: (2010)
Izdano: (2010)
Podobne knjige/članki
-
Quantum communication and security
Izdano: (2007) -
Secure communicating systems design, analysis, and implementation /
od: Huth, Michael, 1962-
Izdano: (2001) -
Contemporary cryptography
od: Oppliger, Rolf
Izdano: (2005) -
Disaster recovery planning for communications and critical infrastructure
od: Wrobel, Leo A. (Leo Anthony)
Izdano: (2009) -
Basics of contemporary cryptography for IT practitioners
od: Ryabko, Boris
Izdano: (2005)