Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Data encryption (Computer science)
- Cryptography 4
- Security measures 3
- COMPUTERS / Cryptography 2
- Computer networks 2
- Access control 1
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Internet / Security 1
- Ciphers 1
- Computer Science 1
- Computer science 1
- Computers 1
- Data Encryption 1
- Electronic information resources 1
- Hashing (Computer science) 1
- History 1
- Information technology 1
- Internet 1
- MATHEMATICS / General 1
- MATHEMATICS / Recreations & Games 1
- Mathematical optimization 1
- Research 1
- Systems and Data Security 1
- Technology 1
-
1
Security secrets, intruders and ID tags.
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
-
3
Modelling cyber security approaches, methodology, strategies /
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
4
-
5
Relation based access control /
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Building the Infrastructure for Cloud Security A Solutions view /
Published 2014Get full text
Electronic eBook -
7
Information security and optimization /
Published 2021Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
8
Secret history the story of cryptology /
Published 2021Taylor & Francis
OCLC metadata license agreement
Electronic eBook