Résultats de la recherche - "Data encryption (Computer science)."
-
1
Quantum cryptography potentially perfect security.
Publié 2003Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
2
Cryptography protocols, design and applications /
Publié 2012Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
3
Identity-based cryptography
Publié 2009Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
4
Color image watermarking : algorithms and technologies /
Publié 2017Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
5
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Publié 2012Sujets: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
6
Machine learning in image steganalysis
Publié 2012Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
7
Video encryption technology and application
Publié 2010Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
8
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Publié 2015Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
9
Trusted platform module basics using TPM in embedded systems /
Publié 2006Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
10
Implementing SSH strategies for optimizing the Secure Shell /
Publié 2004Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
11
Securing information and communications systems principles, technologies, and applications /
Publié 2008Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
12
Modelling cyber security approaches, methodology, strategies /
Publié 2009Sujets: “…Data encryption (Computer science) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Électronique Actes de congrès eBook -
13
Hashing in computer science fifty years of slicing and dicing /
Publié 2010Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
14
Understanding bitcoin : cryptography, engineering and economics. /
Publié 2015Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
15
A comparison between smart cards and trusted platform modules in business scenarios
Publié 2008Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
16
Cryptography and network security : principles and practice /
Publié 2006Sujets: “…Data encryption (Computer science)…”
Livre -
17
Introduction to identity-based encryption
Publié 2008Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
18
Quantum cryptography and computing theory and implementation /
Publié 2010Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
19
Relation based access control /
Publié 2010Sujets: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
20
Managing risk and information security : protect to enable /
Publié 2016Sujets: “…Data encryption (Computer science) 928…”
Livre