Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Data encryption (Computer science)
- Computer security 28
- Security measures 16
- Computer networks 12
- Access control 8
- Cryptography 8
- Computers 6
- COMPUTERS / Cryptography 4
- Computer Science 4
- Computer science 4
- Data Encryption 4
- Electronic information resources 4
- Embedded computer systems 4
- COMPUTERS / Computer Graphics / Game Programming & Design 2
- COMPUTERS / Database Management / Data Mining 2
- COMPUTERS / Internet / Security 2
- COMPUTERS / Security / General 2
- Ciphers 2
- Cloud computing 2
- Coding theory 2
- Hashing (Computer science) 2
- History 2
- Identification 2
- Information technology 2
- Internet 2
- MATHEMATICS / General 2
- MATHEMATICS / Recreations & Games 2
- Mathematical optimization 2
- Public key cryptography 2
- Public key infrastructure (Computer security) 2
-
1
Trusted platform module basics using TPM in embedded systems /
Pubblicazione 2006Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
2
Trusted platform module basics using TPM in embedded systems /
Pubblicazione 2006Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
3
Securing information and communications systems principles, technologies, and applications /
Pubblicazione 2008Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
4
Modelling cyber security approaches, methodology, strategies /
Pubblicazione 2009Soggetti: “...Computer security Congresses....”
An electronic book accessible through the World Wide Web; click to view
Elettronico Atti del Convegno eBook -
5
Hashing in computer science fifty years of slicing and dicing /
Pubblicazione 2010Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
6
Understanding bitcoin : cryptography, engineering and economics. /
Pubblicazione 2015Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
7
Securing information and communications systems principles, technologies, and applications /
Pubblicazione 2008Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
8
Modelling cyber security approaches, methodology, strategies /
Pubblicazione 2009Soggetti: “...Computer security Congresses....”
An electronic book accessible through the World Wide Web; click to view
Elettronico Atti del Convegno eBook -
9
Hashing in computer science fifty years of slicing and dicing /
Pubblicazione 2010Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
10
Understanding bitcoin : cryptography, engineering and economics. /
Pubblicazione 2015Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
11
A comparison between smart cards and trusted platform modules in business scenarios
Pubblicazione 2008Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
12
A comparison between smart cards and trusted platform modules in business scenarios
Pubblicazione 2008Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
13
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Pubblicazione 2015Soggetti: “...Cloud computing Security measures....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
14
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Pubblicazione 2015Soggetti: “...Cloud computing Security measures....”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
15
-
16
Introduction to identity-based encryption
Pubblicazione 2008Soggetti: “...Public key infrastructure (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
17
Introduction to identity-based encryption
Pubblicazione 2008Soggetti: “...Public key infrastructure (Computer security)...”
An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
18
-
19
Relation based access control /
Pubblicazione 2010Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
20
Relation based access control /
Pubblicazione 2010Soggetti: An electronic book accessible through the World Wide Web; click to view
Elettronico eBook