نتائج البحث - "Data encryption (Computer science)."
-
1
Quantum cryptography potentially perfect security.
منشور في 2003الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
2
Cryptography protocols, design and applications /
منشور في 2012الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
3
Cryptography protocols, design and applications /
منشور في 2012الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
4
Quantum cryptography potentially perfect security.
منشور في 2003الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
5
Identity-based cryptography
منشور في 2009الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
6
Color image watermarking : algorithms and technologies /
منشور في 2017الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
7
Identity-based cryptography
منشور في 2009الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
8
Color image watermarking : algorithms and technologies /
منشور في 2017الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
9
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
منشور في 2012الموضوعات: "…Data encryption (Computer science) Law and legislation.…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
10
Machine learning in image steganalysis
منشور في 2012الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
11
Video encryption technology and application
منشور في 2010الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
12
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
منشور في 2015الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
13
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
منشور في 2012الموضوعات: "…Data encryption (Computer science) Law and legislation.…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
14
Machine learning in image steganalysis
منشور في 2012الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
15
Video encryption technology and application
منشور في 2010الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
16
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
منشور في 2015الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
17
Trusted platform module basics using TPM in embedded systems /
منشور في 2006الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
18
Trusted platform module basics using TPM in embedded systems /
منشور في 2006الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
19
Implementing SSH strategies for optimizing the Secure Shell /
منشور في 2004الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني -
20
Securing information and communications systems principles, technologies, and applications /
منشور في 2008الموضوعات: "…Data encryption (Computer science)…"
An electronic book accessible through the World Wide Web; click to view
الكتروني كتاب الكتروني