Ohcanbohtosat
Fáddáevttohusat
Fáddáevttohusat
- Data Encryption
- Data encryption (Computer science) 18
- Computer science 16
- Computer Science 14
- Computers 6
- Information Systems and Communication Service 6
- Software Engineering/Programming and Operating Systems 6
- Software engineering 6
- Business Information Systems 2
- Coding and Information Theory 2
- Coding theory 2
- Computer security 2
- Computers and Society 2
- Database Management 2
- Database management 2
- Economics 2
- Economics/Management Science 2
- Information Systems Applications (incl.Internet) 2
- Information systems 2
- Law and legislation 2
- Legal Aspects of Computing 2
- Management information systems 2
- Mathematics 2
- Popular Science 2
- Popular Science in Mathematics/Computer Science/Natural Science/Technology 2
- Science (General) 2
- Systems and Data Security 2
-
1
Brute Force Cracking the Data Encryption Standard /
Almmustuhtton 2005Viečča ollesdeavstta
Elektrovnnalaš E-girji -
2
Privacy and Identity Management for Life
Almmustuhtton 2011Viečča ollesdeavstta
Elektrovnnalaš E-girji -
3
Managing Risk and Information Security Protect to Enable /
Almmustuhtton 2013Viečča ollesdeavstta
Elektrovnnalaš E-girji -
4
Building the Infrastructure for Cloud Security A Solutions view /
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
5
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Almmustuhtton 2013Viečča ollesdeavstta
Elektrovnnalaš E-girji -
6
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
7
The InfoSec Handbook An Introduction to Information Security /
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
8
Platform Embedded Security Technology Revealed
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
9
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Almmustuhtton 2015Viečča ollesdeavstta
Elektrovnnalaš E-girji -
10
Brute Force Cracking the Data Encryption Standard /
Almmustuhtton 2005Viečča ollesdeavstta
Elektrovnnalaš E-girji -
11
Privacy and Identity Management for Life
Almmustuhtton 2011Viečča ollesdeavstta
Elektrovnnalaš E-girji -
12
Managing Risk and Information Security Protect to Enable /
Almmustuhtton 2013Viečča ollesdeavstta
Elektrovnnalaš E-girji -
13
Building the Infrastructure for Cloud Security A Solutions view /
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
14
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Almmustuhtton 2013Viečča ollesdeavstta
Elektrovnnalaš E-girji -
15
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
16
The InfoSec Handbook An Introduction to Information Security /
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
17
Platform Embedded Security Technology Revealed
Almmustuhtton 2014Viečča ollesdeavstta
Elektrovnnalaš E-girji -
18
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Almmustuhtton 2015Viečča ollesdeavstta
Elektrovnnalaš E-girji