Результаты поиска
Предлагаемые темы внутри своего поиска.
Предлагаемые темы внутри своего поиска.
- Data encryption (Computer science)
- Computer security 22
- Data Encryption 18
- Security measures 18
- Computer science 16
- Computer Science 14
- Computer networks 14
- Cryptography 13
- Computers 10
- Law and legislation 9
- Access control 6
- Coding theory 6
- Information Systems and Communication Service 6
- Software Engineering/Programming and Operating Systems 6
- Software engineering 6
- Wiretapping 6
- Electronic information resources 4
- Electronic surveillance 4
- Embedded computer systems 4
- Political aspects 4
- Privacy, Right of 4
- Public key cryptography 4
- Telecommunication 4
- Aspect politique 2
- Business Information Systems 2
- Certification 2
- Cloud computing 2
- Coding and Information Theory 2
- Computer crimes 2
- Computers and Society 2
-
1
-
2
Brute Force Cracking the Data Encryption Standard /
Опубликовано 2005Полный текст
Электронный ресурс eКнига -
3
-
4
Quantum cryptography potentially perfect security.
Опубликовано 2003An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
5
Security secrets, intruders and ID tags.
Опубликовано 2003An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
6
ExamWise for CIW security professional exam 1D0-470 /
Опубликовано 2003An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
7
Outsourcing information security
Опубликовано 2004An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
8
Implementing SSH strategies for optimizing the Secure Shell /
Опубликовано 2004An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
9
Trusted platform module basics using TPM in embedded systems /
Опубликовано 2006An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
10
Privacy on the line the politics of wiretapping and encryption /
Опубликовано 2007An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
11
Identity-based cryptography
Опубликовано 2009An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
12
Securing information and communications systems principles, technologies, and applications /
Опубликовано 2008An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
13
Introduction to identity-based encryption
Опубликовано 2008An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
14
Modelling cyber security approaches, methodology, strategies /
Опубликовано 2009An electronic book accessible through the World Wide Web; click to view
Электронный ресурс Материалы конференции eКнига -
15
Hashing in computer science fifty years of slicing and dicing /
Опубликовано 2010An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
16
Quantum cryptography and computing theory and implementation /
Опубликовано 2010An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
17
A comparison between smart cards and trusted platform modules in business scenarios
Опубликовано 2008An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
18
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Опубликовано 2012An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
19
Machine learning in image steganalysis
Опубликовано 2012An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига -
20
Surveillance or security? the risks posed by new wiretapping technologies /
Опубликовано 2010An electronic book accessible through the World Wide Web; click to view
Электронный ресурс eКнига