Mostra 1 - 20 risultati di 36 ricerca '"computer security"', tempo di risposta: 0,04s Raffina i risultati
  1. 1

    Trusted platform module basics using TPM in embedded systems / di Kinney, Steven

    Pubblicazione 2006
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  2. 2

    Trusted platform module basics using TPM in embedded systems / di Kinney, Steven

    Pubblicazione 2006
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  3. 3
  4. 4

    Modelling cyber security approaches, methodology, strategies /

    Pubblicazione 2009
    Soggetti: “...Computer security Congresses....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico Atti del Convegno eBook
  5. 5

    Hashing in computer science fifty years of slicing and dicing / di Konheim, Alan G., 1934-

    Pubblicazione 2010
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  6. 6

    Understanding bitcoin : cryptography, engineering and economics. / di Franco, Pedro

    Pubblicazione 2015
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  7. 7
  8. 8

    Modelling cyber security approaches, methodology, strategies /

    Pubblicazione 2009
    Soggetti: “...Computer security Congresses....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico Atti del Convegno eBook
  9. 9

    Hashing in computer science fifty years of slicing and dicing / di Konheim, Alan G., 1934-

    Pubblicazione 2010
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  10. 10

    Understanding bitcoin : cryptography, engineering and economics. / di Franco, Pedro

    Pubblicazione 2015
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  11. 11
  12. 12
  13. 13

    Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond / di Salam, Abdul

    Pubblicazione 2015
    Soggetti: “...Cloud computing Security measures....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  14. 14

    Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond / di Salam, Abdul

    Pubblicazione 2015
    Soggetti: “...Cloud computing Security measures....”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  15. 15

    Cryptography and network security : principles and practice / di Stallings, William

    Pubblicazione 2006
    Soggetti:
    Libro
  16. 16

    Introduction to identity-based encryption di Martin, Luther

    Pubblicazione 2008
    Soggetti: “...Public key infrastructure (Computer security)...”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  17. 17

    Introduction to identity-based encryption di Martin, Luther

    Pubblicazione 2008
    Soggetti: “...Public key infrastructure (Computer security)...”
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  18. 18

    Cryptography and network security : principles and practice / di Stallings, William

    Pubblicazione 2006
    Soggetti:
    Libro
  19. 19

    Relation based access control / di Zhang, Rui

    Pubblicazione 2010
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  20. 20

    Relation based access control / di Zhang, Rui

    Pubblicazione 2010
    Soggetti:
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook