Ngā hua rapu

Whakamahine hua
  1. 1

    Cryptography and network security : principles and practice / Stallings, William

    I whakaputaina 2006
    Pukapuka
  2. 2

    Brute Force Cracking the Data Encryption Standard / Curtin, Matt

    I whakaputaina 2005
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  3. 3

    Privacy and Identity Management for Life Camenisch, Jan

    I whakaputaina 2011
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  4. 4

    Quantum cryptography potentially perfect security.

    I whakaputaina 2003
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  5. 5

    Security secrets, intruders and ID tags.

    I whakaputaina 2003
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  6. 6
  7. 7

    Outsourcing information security Axelrod, C. Warren

    I whakaputaina 2004
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  8. 8
  9. 9
  10. 10
  11. 11

    Identity-based cryptography

    I whakaputaina 2009
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  12. 12
  13. 13

    Introduction to identity-based encryption Martin, Luther

    I whakaputaina 2008
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  14. 14

    Modelling cyber security approaches, methodology, strategies /

    I whakaputaina 2009
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko Mauhanga Hui īPukapuka
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Machine learning in image steganalysis Schaathun, Hans Georg

    I whakaputaina 2012
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  20. 20