Rezultaty

Redukuj rezultaty
  1. 1

    Cryptography and network security : principles and practice / od Stallings, William

    Wydane 2006
    Książka
  2. 2

    Brute Force Cracking the Data Encryption Standard / od Curtin, Matt

    Wydane 2005
    Dokumenty pełnotekstowe
    Elektroniczne E-book
  3. 3

    Privacy and Identity Management for Life od Camenisch, Jan

    Wydane 2011
    Dokumenty pełnotekstowe
    Elektroniczne E-book
  4. 4

    Quantum cryptography potentially perfect security.

    Wydane 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektroniczne E-book
  5. 5

    Security secrets, intruders and ID tags.

    Wydane 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektroniczne E-book
  6. 6
  7. 7

    Outsourcing information security od Axelrod, C. Warren

    Wydane 2004
    An electronic book accessible through the World Wide Web; click to view
    Elektroniczne E-book
  8. 8
  9. 9
  10. 10
  11. 11

    Identity-based cryptography

    Wydane 2009
    An electronic book accessible through the World Wide Web; click to view
    Elektroniczne E-book
  12. 12
  13. 13

    Introduction to identity-based encryption od Martin, Luther

    Wydane 2008
    An electronic book accessible through the World Wide Web; click to view
    Elektroniczne E-book
  14. 14

    Modelling cyber security approaches, methodology, strategies /

    Wydane 2009
    An electronic book accessible through the World Wide Web; click to view
    Elektroniczne Materiały konferencyjne E-book
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Machine learning in image steganalysis od Schaathun, Hans Georg

    Wydane 2012
    An electronic book accessible through the World Wide Web; click to view
    Elektroniczne E-book
  20. 20