Torthaí cuardaigh - "Data encryption (Computer science)"
Topaicí molta laistigh de do chuardach.
Topaicí molta laistigh de do chuardach.
- Data encryption (Computer science) 35
- Computer security 11
- Data Encryption 9
- Security measures 9
- Computer science 8
- Computer Science 7
- Computer networks 7
- Cryptography 6
- Computers 5
- Law and legislation 4
- Access control 3
- Coding theory 3
- Information Systems and Communication Service 3
- Software Engineering/Programming and Operating Systems 3
- Software engineering 3
- Wiretapping 3
- Electronic information resources 2
- Electronic surveillance 2
- Embedded computer systems 2
- Political aspects 2
- Privacy, Right of 2
- Public key cryptography 2
- Telecommunication 2
- Aspect politique 1
- Business Information Systems 1
- Certification 1
- Cloud computing 1
- Coding and Information Theory 1
- Computer crimes 1
- Computers and Society 1
-
1
Quantum cryptography potentially perfect security.
Foilsithe / Cruthaithe 2003Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
2
Cryptography protocols, design and applications /
Foilsithe / Cruthaithe 2012Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
3
Identity-based cryptography
Foilsithe / Cruthaithe 2009Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
4
Color image watermarking : algorithms and technologies /
Foilsithe / Cruthaithe 2017Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
5
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Foilsithe / Cruthaithe 2012Ábhair: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
6
Machine learning in image steganalysis
Foilsithe / Cruthaithe 2012Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
7
Video encryption technology and application
Foilsithe / Cruthaithe 2010Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
8
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Foilsithe / Cruthaithe 2015Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
9
Trusted platform module basics using TPM in embedded systems /
Foilsithe / Cruthaithe 2006Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
10
Implementing SSH strategies for optimizing the Secure Shell /
Foilsithe / Cruthaithe 2004Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
11
Securing information and communications systems principles, technologies, and applications /
Foilsithe / Cruthaithe 2008Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
12
Modelling cyber security approaches, methodology, strategies /
Foilsithe / Cruthaithe 2009Ábhair: “…Data encryption (Computer science) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Imeacht comhdhála Ríomhleabhar -
13
Hashing in computer science fifty years of slicing and dicing /
Foilsithe / Cruthaithe 2010Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
14
Understanding bitcoin : cryptography, engineering and economics. /
Foilsithe / Cruthaithe 2015Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
15
A comparison between smart cards and trusted platform modules in business scenarios
Foilsithe / Cruthaithe 2008Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
16
Cryptography and network security : principles and practice /
Foilsithe / Cruthaithe 2006Ábhair: “…Data encryption (Computer science)…”
LEABHAR -
17
Introduction to identity-based encryption
Foilsithe / Cruthaithe 2008Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
18
Quantum cryptography and computing theory and implementation /
Foilsithe / Cruthaithe 2010Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
19
Relation based access control /
Foilsithe / Cruthaithe 2010Ábhair: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
20
Managing risk and information security : protect to enable /
Foilsithe / Cruthaithe 2016Ábhair: “…Data encryption (Computer science) 928…”
LEABHAR