Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science)
- Security measures
- Computer networks 7
- Computer security 5
- Access control 2
- Computers 2
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Cryptography 1
- COMPUTERS / Database Management / Data Mining 1
- COMPUTERS / Internet / Security 1
- COMPUTERS / Networking / General 1
- COMPUTERS / Security / General 1
- Certification 1
- Cloud computing 1
- Computer crimes 1
- Cryptography 1
- Electronic data processing personnel 1
- Electronic surveillance 1
- Examinations 1
- Government policy 1
- Identification 1
- Information technology 1
- Internet 1
- Mathematical optimization 1
- Political aspects 1
- Research 1
- Risk assessment 1
- TECHNOLOGY / Electricity 1
- TECHNOLOGY / Engineering / Industrial 1
- Technology 1
-
1
-
2
-
3
-
4
-
5
Information security and optimization /
Published 2021Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
6
Hybrid Encryption Algorithms over Wireless Communication Channels /
Published 2021Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
7
Attribute-Based Encryption and Access Control
Published 2020Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
8
Security secrets, intruders and ID tags.
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
ExamWise for CIW security professional exam 1D0-470 /
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Outsourcing information security
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Implementing SSH strategies for optimizing the Secure Shell /
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook