Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science)
- Computer security 24
- Security measures 14
- Computer networks 10
- Cryptography 8
- Access control 6
- Computers 6
- COMPUTERS / Cryptography 4
- Computer Science 4
- Computer science 4
- Data Encryption 4
- Embedded computer systems 4
- COMPUTERS / Computer Graphics / Game Programming & Design 2
- COMPUTERS / Database Management / Data Mining 2
- COMPUTERS / Internet / Security 2
- COMPUTERS / Security / General 2
- Ciphers 2
- Cloud computing 2
- Electronic information resources 2
- Hashing (Computer science) 2
- History 2
- Identification 2
- Information technology 2
- Internet 2
- MATHEMATICS / General 2
- MATHEMATICS / Recreations & Games 2
- Mathematical optimization 2
- Public key cryptography 2
- Public key infrastructure (Computer security) 2
- Research 2
-
1
Trusted platform module basics using TPM in embedded systems /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Trusted platform module basics using TPM in embedded systems /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Securing information and communications systems principles, technologies, and applications /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Hashing in computer science fifty years of slicing and dicing /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Understanding bitcoin : cryptography, engineering and economics. /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Securing information and communications systems principles, technologies, and applications /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Hashing in computer science fifty years of slicing and dicing /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Understanding bitcoin : cryptography, engineering and economics. /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
A comparison between smart cards and trusted platform modules in business scenarios
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
A comparison between smart cards and trusted platform modules in business scenarios
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Published 2015Subjects: “…Cloud computing Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Published 2015Subjects: “…Cloud computing Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Introduction to identity-based encryption
Published 2008Subjects: “…Public key infrastructure (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Introduction to identity-based encryption
Published 2008Subjects: “…Public key infrastructure (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Relation based access control /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Relation based access control /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Building the Infrastructure for Cloud Security A Solutions view /
Published 2014Subjects: Get full text
Electronic eBook -
20
Building the Infrastructure for Cloud Security A Solutions view /
Published 2014Subjects: Get full text
Electronic eBook