Хайлтын үр дүнгүүд

Үр дүнг сайжруулах
  1. 1

    Cryptography and network security : principles and practice / Stallings, William

    Хэвлэсэн 2006
    Ном
  2. 2

    Brute Force Cracking the Data Encryption Standard / Curtin, Matt

    Хэвлэсэн 2005
    Бүрэн текст авах
    Цахим Цахим ном
  3. 3

    Privacy and Identity Management for Life Camenisch, Jan

    Хэвлэсэн 2011
    Бүрэн текст авах
    Цахим Цахим ном
  4. 4

    Quantum cryptography potentially perfect security.

    Хэвлэсэн 2003
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  5. 5

    Security secrets, intruders and ID tags.

    Хэвлэсэн 2003
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  6. 6

    ExamWise for CIW security professional exam 1D0-470 / Bayer, Chad M.

    Хэвлэсэн 2003
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  7. 7

    Outsourcing information security Axelrod, C. Warren

    Хэвлэсэн 2004
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  8. 8

    Implementing SSH strategies for optimizing the Secure Shell / Dwivedi, Himanshu

    Хэвлэсэн 2004
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  9. 9

    Trusted platform module basics using TPM in embedded systems / Kinney, Steven

    Хэвлэсэн 2006
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  10. 10

    Privacy on the line the politics of wiretapping and encryption / Diffie, Whitfield

    Хэвлэсэн 2007
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  11. 11

    Identity-based cryptography

    Хэвлэсэн 2009
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  12. 12

    Securing information and communications systems principles, technologies, and applications /

    Хэвлэсэн 2008
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  13. 13

    Introduction to identity-based encryption Martin, Luther

    Хэвлэсэн 2008
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  14. 14

    Modelling cyber security approaches, methodology, strategies /

    Хэвлэсэн 2009
    An electronic book accessible through the World Wide Web; click to view
    Цахим Бага хурлын үйл явц Цахим ном
  15. 15

    Hashing in computer science fifty years of slicing and dicing / Konheim, Alan G., 1934-

    Хэвлэсэн 2010
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  16. 16

    Quantum cryptography and computing theory and implementation /

    Хэвлэсэн 2010
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  17. 17

    A comparison between smart cards and trusted platform modules in business scenarios Murhammer, Martin W.

    Хэвлэсэн 2008
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  18. 18

    Burdens of proof cryptographic culture and evidence law in the age of electronic documents / Blanchette, Jean-François

    Хэвлэсэн 2012
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  19. 19

    Machine learning in image steganalysis Schaathun, Hans Georg

    Хэвлэсэн 2012
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  20. 20

    Surveillance or security? the risks posed by new wiretapping technologies / Landau, Susan Eva

    Хэвлэсэн 2010
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном