Suchergebnisse - "Data encryption (Computer science)."
-
1
Quantum cryptography potentially perfect security.
Veröffentlicht 2003Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
2
Cryptography protocols, design and applications /
Veröffentlicht 2012Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
3
Cryptography protocols, design and applications /
Veröffentlicht 2012Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
4
Quantum cryptography potentially perfect security.
Veröffentlicht 2003Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
5
Identity-based cryptography
Veröffentlicht 2009Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
6
Color image watermarking : algorithms and technologies /
Veröffentlicht 2017Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
7
Identity-based cryptography
Veröffentlicht 2009Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
8
Color image watermarking : algorithms and technologies /
Veröffentlicht 2017Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
9
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Veröffentlicht 2012Schlagworte: “… Data encryption (Computer science) Law and legislation. …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
10
Machine learning in image steganalysis
Veröffentlicht 2012Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
11
Video encryption technology and application
Veröffentlicht 2010Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
12
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Veröffentlicht 2015Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
13
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Veröffentlicht 2012Schlagworte: “… Data encryption (Computer science) Law and legislation. …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
14
Machine learning in image steganalysis
Veröffentlicht 2012Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
15
Video encryption technology and application
Veröffentlicht 2010Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
16
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Veröffentlicht 2015Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
17
Trusted platform module basics using TPM in embedded systems /
Veröffentlicht 2006Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
18
Trusted platform module basics using TPM in embedded systems /
Veröffentlicht 2006Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
19
Implementing SSH strategies for optimizing the Secure Shell /
Veröffentlicht 2004Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book -
20
Securing information and communications systems principles, technologies, and applications /
Veröffentlicht 2008Schlagworte: “… Data encryption (Computer science) …”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-Book