Risultati della ricerca
Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Data Encryption
- Data encryption (Computer science) 18
- Computer science 16
- Computer Science 14
- Computers 6
- Information Systems and Communication Service 6
- Software Engineering/Programming and Operating Systems 6
- Software engineering 6
- Business Information Systems 2
- Coding and Information Theory 2
- Coding theory 2
- Computer security 2
- Computers and Society 2
- Database Management 2
- Database management 2
- Economics 2
- Economics/Management Science 2
- Information Systems Applications (incl.Internet) 2
- Information systems 2
- Law and legislation 2
- Legal Aspects of Computing 2
- Management information systems 2
- Mathematics 2
- Popular Science 2
- Popular Science in Mathematics/Computer Science/Natural Science/Technology 2
- Science (General) 2
- Systems and Data Security 2
-
1
-
2
-
3
Managing Risk and Information Security Protect to Enable /
Pubblicazione 2013Testo
Elettronico eBook -
4
Building the Infrastructure for Cloud Security A Solutions view /
Pubblicazione 2014Testo
Elettronico eBook -
5
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Pubblicazione 2013Testo
Elettronico eBook -
6
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Pubblicazione 2014Testo
Elettronico eBook -
7
The InfoSec Handbook An Introduction to Information Security /
Pubblicazione 2014Testo
Elettronico eBook -
8
-
9
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Pubblicazione 2015Testo
Elettronico eBook -
10
-
11
-
12
Managing Risk and Information Security Protect to Enable /
Pubblicazione 2013Testo
Elettronico eBook -
13
Building the Infrastructure for Cloud Security A Solutions view /
Pubblicazione 2014Testo
Elettronico eBook -
14
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Pubblicazione 2013Testo
Elettronico eBook -
15
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Pubblicazione 2014Testo
Elettronico eBook -
16
The InfoSec Handbook An Introduction to Information Security /
Pubblicazione 2014Testo
Elettronico eBook -
17
-
18
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Pubblicazione 2015Testo
Elettronico eBook