Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science)
- Computer security 16
- Security measures 8
- Computer networks 6
- Cryptography 6
- Embedded computer systems 4
- Access control 2
- Cloud computing 2
- Computers 2
- Electronic information resources 2
- Hashing (Computer science) 2
- Internet 2
- Public key cryptography 2
- Public key infrastructure (Computer security) 2
- Research 2
- Smart cards 2
- Technology 2
-
1
Trusted platform module basics using TPM in embedded systems /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Trusted platform module basics using TPM in embedded systems /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Securing information and communications systems principles, technologies, and applications /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
5
Hashing in computer science fifty years of slicing and dicing /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Understanding bitcoin : cryptography, engineering and economics. /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Securing information and communications systems principles, technologies, and applications /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Modelling cyber security approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Hashing in computer science fifty years of slicing and dicing /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Understanding bitcoin : cryptography, engineering and economics. /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
A comparison between smart cards and trusted platform modules in business scenarios
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
A comparison between smart cards and trusted platform modules in business scenarios
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Introduction to identity-based encryption
Published 2008Subjects: “…Public key infrastructure (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Introduction to identity-based encryption
Published 2008Subjects: “…Public key infrastructure (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Relation based access control /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Relation based access control /
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Security secrets, intruders and ID tags.
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Security secrets, intruders and ID tags.
Published 2003Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Published 2015Subjects: “…Cloud computing Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Published 2015Subjects: “…Cloud computing Security measures.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook