Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography
- Computer security 28
- Data encryption (Computer science) 8
- COMPUTERS / Cryptography 4
- Access control 2
- Algebra, Boolean 2
- COMPUTERS / Information Technology 2
- COMPUTERS / Security / General 2
- Ciphers 2
- Coding theory 2
- Computer networks 2
- Computers 2
- Data processing 2
- Data protection 2
- Digital watermarking 2
- Embedded computer systems 2
- Hashing (Computer science) 2
- History 2
- IBM computers 2
- Internet 2
- MATHEMATICS / General 2
- MATHEMATICS / Recreations & Games 2
- Management 2
- Number theory 2
- Research 2
- Security measures 2
- Standards 2
- Technology 2
- Watermarks 2
-
1
Contemporary cryptography
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Basics of contemporary cryptography for IT practitioners
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Contemporary cryptography
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Basics of contemporary cryptography for IT practitioners
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Secure multi-party computation
Published 2013Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Secure multi-party computation
Published 2013Subjects: “…Computer security Management.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
zSeries crypto guide update
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
IBM eserver zSeries 990 (z990) cryptography implementation
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
zSeries crypto guide update
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
IBM eserver zSeries 990 (z990) cryptography implementation
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
zSeries Trusted Key Entry (TKE) version 4.2 update
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
zSeries Trusted Key Entry (TKE) version 4.2 update
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
User's guide to cryptography and standards
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
15
User's guide to cryptography and standards
Published 2005Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Boolean functions in cryptology and information security
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
Intelligent watermarking techniques
Published 2004Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
19
Hashing in computer science fifty years of slicing and dicing /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook