Hakutulokset - "Data encryption (Computer science)."
-
1
Quantum cryptography potentially perfect security.
Julkaistu 2003Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
2
Cryptography protocols, design and applications /
Julkaistu 2012Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
3
Identity-based cryptography
Julkaistu 2009Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
4
Color image watermarking : algorithms and technologies /
Julkaistu 2017Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
5
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Julkaistu 2012Aiheet: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
6
Machine learning in image steganalysis
Julkaistu 2012Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
7
Video encryption technology and application
Julkaistu 2010Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
8
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Julkaistu 2015Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
9
Trusted platform module basics using TPM in embedded systems /
Julkaistu 2006Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
10
Implementing SSH strategies for optimizing the Secure Shell /
Julkaistu 2004Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
11
Securing information and communications systems principles, technologies, and applications /
Julkaistu 2008Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
12
Modelling cyber security approaches, methodology, strategies /
Julkaistu 2009Aiheet: “…Data encryption (Computer science) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen Konferenssijulkaisu E-kirja -
13
Hashing in computer science fifty years of slicing and dicing /
Julkaistu 2010Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
14
Understanding bitcoin : cryptography, engineering and economics. /
Julkaistu 2015Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
15
A comparison between smart cards and trusted platform modules in business scenarios
Julkaistu 2008Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
16
Cryptography and network security : principles and practice /
Julkaistu 2006Aiheet: “…Data encryption (Computer science)…”
Kirja -
17
Introduction to identity-based encryption
Julkaistu 2008Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
18
Quantum cryptography and computing theory and implementation /
Julkaistu 2010Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
19
Relation based access control /
Julkaistu 2010Aiheet: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
20
Managing risk and information security : protect to enable /
Julkaistu 2016Aiheet: “…Data encryption (Computer science) 928…”
Kirja