Resultados da pesquisa

Refinar resultados
  1. 1

    Cryptography and network security : principles and practice / Por Stallings, William

    Publicado em 2006
    Livro
  2. 2

    Brute Force Cracking the Data Encryption Standard / Por Curtin, Matt

    Publicado em 2005
    Obter o texto integral
    Recurso Electrónico livro electrónico
  3. 3

    Privacy and Identity Management for Life Por Camenisch, Jan

    Publicado em 2011
    Obter o texto integral
    Recurso Electrónico livro electrónico
  4. 4

    Quantum cryptography potentially perfect security.

    Publicado em 2003
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  5. 5

    Security secrets, intruders and ID tags.

    Publicado em 2003
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  6. 6

    ExamWise for CIW security professional exam 1D0-470 / Por Bayer, Chad M.

    Publicado em 2003
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  7. 7

    Outsourcing information security Por Axelrod, C. Warren

    Publicado em 2004
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  8. 8

    Implementing SSH strategies for optimizing the Secure Shell / Por Dwivedi, Himanshu

    Publicado em 2004
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  9. 9

    Trusted platform module basics using TPM in embedded systems / Por Kinney, Steven

    Publicado em 2006
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  10. 10

    Privacy on the line the politics of wiretapping and encryption / Por Diffie, Whitfield

    Publicado em 2007
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  11. 11

    Identity-based cryptography

    Publicado em 2009
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  12. 12

    Securing information and communications systems principles, technologies, and applications /

    Publicado em 2008
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  13. 13

    Introduction to identity-based encryption Por Martin, Luther

    Publicado em 2008
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  14. 14

    Modelling cyber security approaches, methodology, strategies /

    Publicado em 2009
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico Conference Proceeding livro electrónico
  15. 15

    Hashing in computer science fifty years of slicing and dicing / Por Konheim, Alan G., 1934-

    Publicado em 2010
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  16. 16

    Quantum cryptography and computing theory and implementation /

    Publicado em 2010
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  17. 17
  18. 18
  19. 19

    Machine learning in image steganalysis Por Schaathun, Hans Georg

    Publicado em 2012
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  20. 20

    Surveillance or security? the risks posed by new wiretapping technologies / Por Landau, Susan Eva

    Publicado em 2010
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico