Canlyniadau Chwilio - "Data encryption (Computer science)"
Pynciau a Argymhellir O fewn eich chwiliad
Pynciau a Argymhellir O fewn eich chwiliad
- Data encryption (Computer science) 35
- Computer security 11
- Data Encryption 9
- Security measures 9
- Computer science 8
- Computer Science 7
- Computer networks 7
- Cryptography 6
- Computers 5
- Law and legislation 4
- Access control 3
- Coding theory 3
- Information Systems and Communication Service 3
- Software Engineering/Programming and Operating Systems 3
- Software engineering 3
- Wiretapping 3
- Electronic information resources 2
- Electronic surveillance 2
- Embedded computer systems 2
- Political aspects 2
- Privacy, Right of 2
- Public key cryptography 2
- Telecommunication 2
- Aspect politique 1
- Business Information Systems 1
- Certification 1
- Cloud computing 1
- Coding and Information Theory 1
- Computer crimes 1
- Computers and Society 1
-
1
Quantum cryptography potentially perfect security.
Cyhoeddwyd 2003Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
2
Cryptography protocols, design and applications /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
3
Identity-based cryptography
Cyhoeddwyd 2009Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
4
Color image watermarking : algorithms and technologies /
Cyhoeddwyd 2017Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
5
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science) Law and legislation....”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
6
Machine learning in image steganalysis
Cyhoeddwyd 2012Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
7
Video encryption technology and application
Cyhoeddwyd 2010Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
8
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Cyhoeddwyd 2015Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
9
Trusted platform module basics using TPM in embedded systems /
Cyhoeddwyd 2006Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
10
Implementing SSH strategies for optimizing the Secure Shell /
Cyhoeddwyd 2004Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
11
Securing information and communications systems principles, technologies, and applications /
Cyhoeddwyd 2008Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
12
Modelling cyber security approaches, methodology, strategies /
Cyhoeddwyd 2009Pynciau: “...Data encryption (Computer science) Congresses....”
An electronic book accessible through the World Wide Web; click to view
Electronig Trafodyn Cynhadledd eLyfr -
13
Hashing in computer science fifty years of slicing and dicing /
Cyhoeddwyd 2010Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
14
Understanding bitcoin : cryptography, engineering and economics. /
Cyhoeddwyd 2015Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
15
A comparison between smart cards and trusted platform modules in business scenarios
Cyhoeddwyd 2008Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
16
Cryptography and network security : principles and practice /
Cyhoeddwyd 2006Pynciau: “...Data encryption (Computer science)...”
Llyfr -
17
Introduction to identity-based encryption
Cyhoeddwyd 2008Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
18
Quantum cryptography and computing theory and implementation /
Cyhoeddwyd 2010Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
19
Relation based access control /
Cyhoeddwyd 2010Pynciau: “...Data encryption (Computer science)...”
An electronic book accessible through the World Wide Web; click to view
Electronig eLyfr -
20
Managing risk and information security : protect to enable /
Cyhoeddwyd 2016Pynciau: “...Data encryption (Computer science) 928...”
Llyfr