Torthaí cuardaigh

  1. 1

    Cryptography and network security : principles and practice / de réir Stallings, William

    Foilsithe / Cruthaithe 2006
    LEABHAR
  2. 2

    Brute Force Cracking the Data Encryption Standard / de réir Curtin, Matt

    Foilsithe / Cruthaithe 2005
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  3. 3

    Privacy and Identity Management for Life de réir Camenisch, Jan

    Foilsithe / Cruthaithe 2011
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  4. 4

    Quantum cryptography potentially perfect security.

    Foilsithe / Cruthaithe 2003
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  5. 5

    Security secrets, intruders and ID tags.

    Foilsithe / Cruthaithe 2003
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  6. 6

    ExamWise for CIW security professional exam 1D0-470 / de réir Bayer, Chad M.

    Foilsithe / Cruthaithe 2003
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  7. 7

    Outsourcing information security de réir Axelrod, C. Warren

    Foilsithe / Cruthaithe 2004
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  8. 8

    Implementing SSH strategies for optimizing the Secure Shell / de réir Dwivedi, Himanshu

    Foilsithe / Cruthaithe 2004
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  9. 9

    Trusted platform module basics using TPM in embedded systems / de réir Kinney, Steven

    Foilsithe / Cruthaithe 2006
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  10. 10

    Privacy on the line the politics of wiretapping and encryption / de réir Diffie, Whitfield

    Foilsithe / Cruthaithe 2007
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  11. 11

    Identity-based cryptography

    Foilsithe / Cruthaithe 2009
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  12. 12
  13. 13

    Introduction to identity-based encryption de réir Martin, Luther

    Foilsithe / Cruthaithe 2008
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  14. 14

    Modelling cyber security approaches, methodology, strategies /

    Foilsithe / Cruthaithe 2009
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Imeacht comhdhála Ríomhleabhar
  15. 15

    Hashing in computer science fifty years of slicing and dicing / de réir Konheim, Alan G., 1934-

    Foilsithe / Cruthaithe 2010
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  16. 16

    Quantum cryptography and computing theory and implementation /

    Foilsithe / Cruthaithe 2010
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  17. 17
  18. 18
  19. 19

    Machine learning in image steganalysis de réir Schaathun, Hans Georg

    Foilsithe / Cruthaithe 2012
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  20. 20

    Surveillance or security? the risks posed by new wiretapping technologies / de réir Landau, Susan Eva

    Foilsithe / Cruthaithe 2010
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar