Digital watermarking and steganography
I tiakina i:
| Kaituhi rangatōpū: | ebrary, Inc |
|---|---|
| Ētahi atu kaituhi: | Cox, I. J. (Ingemar J.) |
| Hōputu: | Tāhiko īPukapuka |
| Reo: | Ingarihi |
| I whakaputaina: |
Amsterdam ; Boston :
Morgan Kaufmann Publishers,
c2008.
|
| Putanga: | 2nd ed. |
| Rangatū: | Morgan Kaufmann series in multimedia information and systems.
Morgan Kaufmann series in computer security. |
| Ngā marau: | |
| Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
| Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Digital watermarking and steganography
I whakaputaina: (2008)
I whakaputaina: (2008)
Intelligent watermarking techniques
I whakaputaina: (2004)
I whakaputaina: (2004)
Intelligent watermarking techniques
I whakaputaina: (2004)
I whakaputaina: (2004)
Techniques and applications of digital watermarking and content protection
mā: Arnold, Michael (Michael Konrad), 1964-
I whakaputaina: (2003)
mā: Arnold, Michael (Michael Konrad), 1964-
I whakaputaina: (2003)
Techniques and applications of digital watermarking and content protection
mā: Arnold, Michael (Michael Konrad), 1964-
I whakaputaina: (2003)
mā: Arnold, Michael (Michael Konrad), 1964-
I whakaputaina: (2003)
Color image watermarking : algorithms and technologies /
mā: Su, Qingtang
I whakaputaina: (2017)
mā: Su, Qingtang
I whakaputaina: (2017)
Color image watermarking : algorithms and technologies /
mā: Su, Qingtang
I whakaputaina: (2017)
mā: Su, Qingtang
I whakaputaina: (2017)
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
I whakaputaina: (2007)
I whakaputaina: (2007)
Papers from the first European workshop on technological & security issues in digital rights management (EuDiRights)
I whakaputaina: (2007)
I whakaputaina: (2007)
Information security policy, processes, and practices /
I whakaputaina: (2008)
I whakaputaina: (2008)
Information security policy, processes, and practices /
I whakaputaina: (2008)
I whakaputaina: (2008)
Black hat physical device security exploiting hardware and software /
mā: Miller, Drew
I whakaputaina: (2005)
mā: Miller, Drew
I whakaputaina: (2005)
A process for developing a common vocabulary in the information security area
I whakaputaina: (2007)
I whakaputaina: (2007)
Comptia Security+ 2008 in depth
mā: Ciampa, Mark D.
I whakaputaina: (2009)
mā: Ciampa, Mark D.
I whakaputaina: (2009)
Information assurance for the enterprise : a roadmap to information security /
mā: Schou, Corey
I whakaputaina: (2007)
mā: Schou, Corey
I whakaputaina: (2007)
Information assurance and computer security
I whakaputaina: (2006)
I whakaputaina: (2006)
Data privacy in the information age
mā: Klosek, Jacqueline, 1972-
I whakaputaina: (2000)
mā: Klosek, Jacqueline, 1972-
I whakaputaina: (2000)
Getting started with FortiGate /
mā: Fabbri, Rosato
I whakaputaina: (2013)
mā: Fabbri, Rosato
I whakaputaina: (2013)
Comptia Security+ 2008 in depth
mā: Ciampa, Mark D.
I whakaputaina: (2009)
mā: Ciampa, Mark D.
I whakaputaina: (2009)
A process for developing a common vocabulary in the information security area
I whakaputaina: (2007)
I whakaputaina: (2007)
Information assurance and computer security
I whakaputaina: (2006)
I whakaputaina: (2006)
Information assurance for the enterprise : a roadmap to information security /
mā: Schou, Corey
I whakaputaina: (2007)
mā: Schou, Corey
I whakaputaina: (2007)
Data privacy in the information age
mā: Klosek, Jacqueline, 1972-
I whakaputaina: (2000)
mā: Klosek, Jacqueline, 1972-
I whakaputaina: (2000)
Black hat physical device security exploiting hardware and software /
mā: Miller, Drew
I whakaputaina: (2005)
mā: Miller, Drew
I whakaputaina: (2005)
Getting started with FortiGate /
mā: Fabbri, Rosato
I whakaputaina: (2013)
mā: Fabbri, Rosato
I whakaputaina: (2013)
Implementing database security and auditing
mā: Ben-Natan, Ron
I whakaputaina: (2005)
mā: Ben-Natan, Ron
I whakaputaina: (2005)
Implementing database security and auditing
mā: Ben-Natan, Ron
I whakaputaina: (2005)
mā: Ben-Natan, Ron
I whakaputaina: (2005)
Crackproof your software the best ways to protect your software against crackers /
mā: C̆ervĕn, Pavol
I whakaputaina: (2002)
mā: C̆ervĕn, Pavol
I whakaputaina: (2002)
Crackproof your software the best ways to protect your software against crackers /
mā: C̆ervĕn, Pavol
I whakaputaina: (2002)
mā: C̆ervĕn, Pavol
I whakaputaina: (2002)
A practical guide to managing information security
mā: Purser, Steve
I whakaputaina: (2004)
mā: Purser, Steve
I whakaputaina: (2004)
Information security management principles
mā: Alexander, David
I whakaputaina: (2013)
mā: Alexander, David
I whakaputaina: (2013)
A practical guide to managing information security
mā: Purser, Steve
I whakaputaina: (2004)
mā: Purser, Steve
I whakaputaina: (2004)
Information security management principles
mā: Alexander, David
I whakaputaina: (2013)
mā: Alexander, David
I whakaputaina: (2013)
Technology and privacy the new landscape /
I whakaputaina: (1997)
I whakaputaina: (1997)
Privacy protection and computer forensics
mā: Caloyannides, Michael A.
I whakaputaina: (2004)
mā: Caloyannides, Michael A.
I whakaputaina: (2004)
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology /
I whakaputaina: (2003)
I whakaputaina: (2003)
Technology and privacy the new landscape /
I whakaputaina: (1997)
I whakaputaina: (1997)
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology /
I whakaputaina: (2003)
I whakaputaina: (2003)
Privacy protection and computer forensics
mā: Caloyannides, Michael A.
I whakaputaina: (2004)
mā: Caloyannides, Michael A.
I whakaputaina: (2004)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
I whakaputaina: (2009)
I whakaputaina: (2009)
Ngā tūemi rite
-
Digital watermarking and steganography
I whakaputaina: (2008) -
Intelligent watermarking techniques
I whakaputaina: (2004) -
Intelligent watermarking techniques
I whakaputaina: (2004) -
Techniques and applications of digital watermarking and content protection
mā: Arnold, Michael (Michael Konrad), 1964-
I whakaputaina: (2003) -
Techniques and applications of digital watermarking and content protection
mā: Arnold, Michael (Michael Konrad), 1964-
I whakaputaina: (2003)