Canlyniadau Chwilio - "Data Encryption."
-
1
Quantum cryptography potentially perfect security.
Cyhoeddwyd 2003Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
2
Cryptography protocols, design and applications /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
3
Cryptography protocols, design and applications /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
4
Quantum cryptography potentially perfect security.
Cyhoeddwyd 2003Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
5
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Cyhoeddwyd 2013Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
6
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Cyhoeddwyd 2013Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
7
Managing Risk and Information Security Protect to Enable /
Cyhoeddwyd 2013Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
8
Building the Infrastructure for Cloud Security A Solutions view /
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
9
The InfoSec Handbook An Introduction to Information Security /
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
10
Managing Risk and Information Security Protect to Enable /
Cyhoeddwyd 2013Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
11
Building the Infrastructure for Cloud Security A Solutions view /
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
12
The InfoSec Handbook An Introduction to Information Security /
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
13
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
14
Platform Embedded Security Technology Revealed
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
15
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Cyhoeddwyd 2015Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
16
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
17
Platform Embedded Security Technology Revealed
Cyhoeddwyd 2014Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
18
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Cyhoeddwyd 2015Pynciau: “...Data Encryption....”
Cael y testun llawn
Electronig eLyfr -
19
Identity-based cryptography
Cyhoeddwyd 2009Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
20
Color image watermarking : algorithms and technologies /
Cyhoeddwyd 2017Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr