Torthaí cuardaigh - "Data Encryption."

  1. 1

    Quantum cryptography potentially perfect security.

    Foilsithe / Cruthaithe 2003
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  2. 2

    Cryptography protocols, design and applications /

    Foilsithe / Cruthaithe 2012
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  3. 3

    Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters / de réir Futral, William, Greene, James

    Foilsithe / Cruthaithe 2013
    Ábhair: “…Data Encryption.…”
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  4. 4

    Managing Risk and Information Security Protect to Enable / de réir Harkins, Malcolm

    Foilsithe / Cruthaithe 2013
    Ábhair: “…Data Encryption.…”
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  5. 5

    Building the Infrastructure for Cloud Security A Solutions view / de réir Yeluri, Raghu, Castro-Leon, Enrique

    Foilsithe / Cruthaithe 2014
    Ábhair: “…Data Encryption.…”
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  6. 6

    The InfoSec Handbook An Introduction to Information Security / de réir Rao, Umesh Hodeghatta, Nayak, Umesha

    Foilsithe / Cruthaithe 2014
    Ábhair: “…Data Encryption.…”
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  7. 7

    The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value / de réir Dennedy, Michelle Finneran, Fox, Jonathan, Finneran, Thomas R.

    Foilsithe / Cruthaithe 2014
    Ábhair: “…Data Encryption.…”
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  8. 8

    Platform Embedded Security Technology Revealed de réir Ruan, Xiaoyu

    Foilsithe / Cruthaithe 2014
    Ábhair: “…Data Encryption.…”
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  9. 9

    A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security / de réir Arthur, Will, Challener, David, Goldman, Kenneth

    Foilsithe / Cruthaithe 2015
    Ábhair: “…Data Encryption.…”
    Faigh an téacs iomlán
    Leictreonach Ríomhleabhar
  10. 10

    Identity-based cryptography

    Foilsithe / Cruthaithe 2009
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  11. 11

    Color image watermarking : algorithms and technologies / de réir Su, Qingtang

    Foilsithe / Cruthaithe 2017
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  12. 12

    Burdens of proof cryptographic culture and evidence law in the age of electronic documents / de réir Blanchette, Jean-François

    Foilsithe / Cruthaithe 2012
    Ábhair: “…Data encryption (Computer science) Law and legislation.…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  13. 13

    Machine learning in image steganalysis de réir Schaathun, Hans Georg

    Foilsithe / Cruthaithe 2012
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  14. 14

    Video encryption technology and application de réir Xu, Zhengquan, 1962-

    Foilsithe / Cruthaithe 2010
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  15. 15

    Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond / de réir Salam, Abdul

    Foilsithe / Cruthaithe 2015
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  16. 16

    Trusted platform module basics using TPM in embedded systems / de réir Kinney, Steven

    Foilsithe / Cruthaithe 2006
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  17. 17

    Implementing SSH strategies for optimizing the Secure Shell / de réir Dwivedi, Himanshu

    Foilsithe / Cruthaithe 2004
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  18. 18

    Securing information and communications systems principles, technologies, and applications /

    Foilsithe / Cruthaithe 2008
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  19. 19

    Modelling cyber security approaches, methodology, strategies /

    Foilsithe / Cruthaithe 2009
    Ábhair: “…Data encryption (Computer science) Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Imeacht comhdhála Ríomhleabhar
  20. 20

    Hashing in computer science fifty years of slicing and dicing / de réir Konheim, Alan G., 1934-

    Foilsithe / Cruthaithe 2010
    Ábhair: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar