Arama Sonuçları
Önerilen Konular
Önerilen Konular
- Data encryption (Computer science)
- Computer security 11
- Data Encryption 9
- Security measures 9
- Computer science 8
- Computer Science 7
- Computer networks 7
- Cryptography 6
- Computers 5
- Law and legislation 4
- Access control 3
- Coding theory 3
- Information Systems and Communication Service 3
- Software Engineering/Programming and Operating Systems 3
- Software engineering 3
- Wiretapping 3
- Electronic information resources 2
- Electronic surveillance 2
- Embedded computer systems 2
- Political aspects 2
- Privacy, Right of 2
- Public key cryptography 2
- Telecommunication 2
- Aspect politique 1
- Business Information Systems 1
- Certification 1
- Cloud computing 1
- Coding and Information Theory 1
- Computer crimes 1
- Computers and Society 1
-
1
-
2
Brute Force Cracking the Data Encryption Standard /
Baskı/Yayın Bilgisi 2005Tam Metin Erişim
Elektronik Ekitap -
3
Privacy and Identity Management for Life
Baskı/Yayın Bilgisi 2011Tam Metin Erişim
Elektronik Ekitap -
4
Quantum cryptography potentially perfect security.
Baskı/Yayın Bilgisi 2003An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
5
Security secrets, intruders and ID tags.
Baskı/Yayın Bilgisi 2003An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
6
ExamWise for CIW security professional exam 1D0-470 /
Baskı/Yayın Bilgisi 2003An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
7
Outsourcing information security
Baskı/Yayın Bilgisi 2004An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
8
Implementing SSH strategies for optimizing the Secure Shell /
Baskı/Yayın Bilgisi 2004An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
9
Trusted platform module basics using TPM in embedded systems /
Baskı/Yayın Bilgisi 2006An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
10
Privacy on the line the politics of wiretapping and encryption /
Baskı/Yayın Bilgisi 2007An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
11
Identity-based cryptography
Baskı/Yayın Bilgisi 2009An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
12
Securing information and communications systems principles, technologies, and applications /
Baskı/Yayın Bilgisi 2008An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
13
Introduction to identity-based encryption
Baskı/Yayın Bilgisi 2008An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
14
Modelling cyber security approaches, methodology, strategies /
Baskı/Yayın Bilgisi 2009An electronic book accessible through the World Wide Web; click to view
Elektronik Konferans Sunumu Ekitap -
15
Hashing in computer science fifty years of slicing and dicing /
Baskı/Yayın Bilgisi 2010An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
16
Quantum cryptography and computing theory and implementation /
Baskı/Yayın Bilgisi 2010An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
17
A comparison between smart cards and trusted platform modules in business scenarios
Baskı/Yayın Bilgisi 2008An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
18
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Baskı/Yayın Bilgisi 2012An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
19
Machine learning in image steganalysis
Baskı/Yayın Bilgisi 2012An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap -
20
Surveillance or security? the risks posed by new wiretapping technologies /
Baskı/Yayın Bilgisi 2010An electronic book accessible through the World Wide Web; click to view
Elektronik Ekitap