Hakutulokset - "Data Encryption."
-
1
Quantum cryptography potentially perfect security.
Julkaistu 2003Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
2
Cryptography protocols, design and applications /
Julkaistu 2012Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
3
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Julkaistu 2013Aiheet: “…Data Encryption.…”
Hae kokoteksti
Elektroninen E-kirja -
4
Managing Risk and Information Security Protect to Enable /
Julkaistu 2013Aiheet: “…Data Encryption.…”
Hae kokoteksti
Elektroninen E-kirja -
5
Building the Infrastructure for Cloud Security A Solutions view /
Julkaistu 2014Aiheet: “…Data Encryption.…”
Hae kokoteksti
Elektroninen E-kirja -
6
The InfoSec Handbook An Introduction to Information Security /
Julkaistu 2014Aiheet: “…Data Encryption.…”
Hae kokoteksti
Elektroninen E-kirja -
7
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Julkaistu 2014Aiheet: “…Data Encryption.…”
Hae kokoteksti
Elektroninen E-kirja -
8
Platform Embedded Security Technology Revealed
Julkaistu 2014Aiheet: “…Data Encryption.…”
Hae kokoteksti
Elektroninen E-kirja -
9
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Julkaistu 2015Aiheet: “…Data Encryption.…”
Hae kokoteksti
Elektroninen E-kirja -
10
Identity-based cryptography
Julkaistu 2009Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
11
Color image watermarking : algorithms and technologies /
Julkaistu 2017Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
12
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Julkaistu 2012Aiheet: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
13
Machine learning in image steganalysis
Julkaistu 2012Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
14
Video encryption technology and application
Julkaistu 2010Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
15
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Julkaistu 2015Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
16
Trusted platform module basics using TPM in embedded systems /
Julkaistu 2006Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
17
Implementing SSH strategies for optimizing the Secure Shell /
Julkaistu 2004Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
18
Securing information and communications systems principles, technologies, and applications /
Julkaistu 2008Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
19
Modelling cyber security approaches, methodology, strategies /
Julkaistu 2009Aiheet: “…Data encryption (Computer science) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen Konferenssijulkaisu E-kirja -
20
Hashing in computer science fifty years of slicing and dicing /
Julkaistu 2010Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja