Cryptography's role in securing the information society
Na minha lista:
Autor Corporativo: | ebrary, Inc |
---|---|
Outros Autores: | Dam, Kenneth W., Lin, Herbert |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Washington, DC :
National Academy Press,
1996.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Cryptography's role in securing the information society
Publicado em: (1996)
Publicado em: (1996)
Quantum communication and security
Publicado em: (2007)
Publicado em: (2007)
Quantum communication and security
Publicado em: (2007)
Publicado em: (2007)
Secure communicating systems design, analysis, and implementation /
Por: Huth, Michael, 1962-
Publicado em: (2001)
Por: Huth, Michael, 1962-
Publicado em: (2001)
Secure communicating systems design, analysis, and implementation /
Por: Huth, Michael, 1962-
Publicado em: (2001)
Por: Huth, Michael, 1962-
Publicado em: (2001)
Contemporary cryptography
Por: Oppliger, Rolf
Publicado em: (2005)
Por: Oppliger, Rolf
Publicado em: (2005)
Contemporary cryptography
Por: Oppliger, Rolf
Publicado em: (2005)
Por: Oppliger, Rolf
Publicado em: (2005)
Disaster recovery planning for communications and critical infrastructure
Por: Wrobel, Leo A. (Leo Anthony)
Publicado em: (2009)
Por: Wrobel, Leo A. (Leo Anthony)
Publicado em: (2009)
Disaster recovery planning for communications and critical infrastructure
Por: Wrobel, Leo A. (Leo Anthony)
Publicado em: (2009)
Por: Wrobel, Leo A. (Leo Anthony)
Publicado em: (2009)
Basics of contemporary cryptography for IT practitioners
Por: Ryabko, Boris
Publicado em: (2005)
Por: Ryabko, Boris
Publicado em: (2005)
Basics of contemporary cryptography for IT practitioners
Por: Ryabko, Boris
Publicado em: (2005)
Por: Ryabko, Boris
Publicado em: (2005)
Convergence : illicit networks and national security in the age of globalization /
Publicado em: (2013)
Publicado em: (2013)
Convergence : illicit networks and national security in the age of globalization /
Publicado em: (2013)
Publicado em: (2013)
Surveillance or security? the risks posed by new wiretapping technologies /
Por: Landau, Susan Eva
Publicado em: (2010)
Por: Landau, Susan Eva
Publicado em: (2010)
Surveillance or security? the risks posed by new wiretapping technologies /
Por: Landau, Susan Eva
Publicado em: (2010)
Por: Landau, Susan Eva
Publicado em: (2010)
Online information review.
Publicado em: (2007)
Publicado em: (2007)
Online information review.
Publicado em: (2007)
Publicado em: (2007)
Contemporary cryptography /
Por: Oppliger, Rolf
Publicado em: (2011)
Por: Oppliger, Rolf
Publicado em: (2011)
Contemporary cryptography /
Por: Oppliger, Rolf
Publicado em: (2011)
Por: Oppliger, Rolf
Publicado em: (2011)
Security and privacy in mobile and wireless networking /
Publicado em: (2009)
Publicado em: (2009)
Security and privacy in mobile and wireless networking /
Publicado em: (2009)
Publicado em: (2009)
Cryptography for developers
Por: St. Denis, Tom
Publicado em: (2007)
Por: St. Denis, Tom
Publicado em: (2007)
Cryptography for developers
Por: St. Denis, Tom
Publicado em: (2007)
Por: St. Denis, Tom
Publicado em: (2007)
Coding and cryptography : synergy for a robust communication /
Por: Živić, Nataša
Publicado em: (2013)
Por: Živić, Nataša
Publicado em: (2013)
Coding and cryptography : synergy for a robust communication /
Por: Živić, Nataša
Publicado em: (2013)
Por: Živić, Nataša
Publicado em: (2013)
User's guide to cryptography and standards
Por: Dent, Alexander W.
Publicado em: (2005)
Por: Dent, Alexander W.
Publicado em: (2005)
User's guide to cryptography and standards
Por: Dent, Alexander W.
Publicado em: (2005)
Por: Dent, Alexander W.
Publicado em: (2005)
Cryptography protocols, design and applications /
Publicado em: (2012)
Publicado em: (2012)
Cryptography protocols, design and applications /
Publicado em: (2012)
Publicado em: (2012)
Quantum cryptography potentially perfect security.
Publicado em: (2003)
Publicado em: (2003)
Quantum cryptography potentially perfect security.
Publicado em: (2003)
Publicado em: (2003)
IBM eserver zSeries 990 (z990) cryptography implementation
Publicado em: (2004)
Publicado em: (2004)
IBM eserver zSeries 990 (z990) cryptography implementation
Publicado em: (2004)
Publicado em: (2004)
Electricity requirements for a digital society
Por: Baer, Walter S.
Publicado em: (2002)
Por: Baer, Walter S.
Publicado em: (2002)
Electricity requirements for a digital society
Por: Baer, Walter S.
Publicado em: (2002)
Por: Baer, Walter S.
Publicado em: (2002)
An introduction to mathematical cryptography
Por: Hoffstein, Jeffrey
Publicado em: (2008)
Por: Hoffstein, Jeffrey
Publicado em: (2008)
An introduction to mathematical cryptography
Por: Hoffstein, Jeffrey
Publicado em: (2008)
Por: Hoffstein, Jeffrey
Publicado em: (2008)
Introduction to communication systems simulation
Por: Schiff, Maurice, 1942-
Publicado em: (2006)
Por: Schiff, Maurice, 1942-
Publicado em: (2006)
Introduction to communication systems simulation
Por: Schiff, Maurice, 1942-
Publicado em: (2006)
Por: Schiff, Maurice, 1942-
Publicado em: (2006)
Security secrets, intruders and ID tags.
Publicado em: (2003)
Publicado em: (2003)
Registos relacionados
-
Cryptography's role in securing the information society
Publicado em: (1996) -
Quantum communication and security
Publicado em: (2007) -
Quantum communication and security
Publicado em: (2007) -
Secure communicating systems design, analysis, and implementation /
Por: Huth, Michael, 1962-
Publicado em: (2001) -
Secure communicating systems design, analysis, and implementation /
Por: Huth, Michael, 1962-
Publicado em: (2001)