Ngā hua rapu
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Data Encryption
- Data encryption (Computer science) 9
- Computer science 8
- Computer Science 7
- Computers 3
- Information Systems and Communication Service 3
- Software Engineering/Programming and Operating Systems 3
- Software engineering 3
- Business Information Systems 1
- Coding and Information Theory 1
- Coding theory 1
- Computer security 1
- Computers and Society 1
- Database Management 1
- Database management 1
- Economics 1
- Economics/Management Science 1
- Information Systems Applications (incl.Internet) 1
- Information systems 1
- Law and legislation 1
- Legal Aspects of Computing 1
- Management information systems 1
- Mathematics 1
- Popular Science 1
- Popular Science in Mathematics/Computer Science/Natural Science/Technology 1
- Science (General) 1
- Systems and Data Security 1
-
1
Brute Force Cracking the Data Encryption Standard /
I whakaputaina 2005Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
2
-
3
Managing Risk and Information Security Protect to Enable /
I whakaputaina 2013Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
4
Building the Infrastructure for Cloud Security A Solutions view /
I whakaputaina 2014Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
5
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
I whakaputaina 2013Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
6
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
I whakaputaina 2014Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
7
The InfoSec Handbook An Introduction to Information Security /
I whakaputaina 2014Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
8
Platform Embedded Security Technology Revealed
I whakaputaina 2014Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
9
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
I whakaputaina 2015Whiwhi kuputuhi katoa
Tāhiko īPukapuka