Ngā hua rapu - "Data Encryption."

Whakamahine hua
  1. 1

    Quantum cryptography potentially perfect security.

    I whakaputaina 2003
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  2. 2

    Cryptography protocols, design and applications /

    I whakaputaina 2012
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  3. 3

    Cryptography protocols, design and applications /

    I whakaputaina 2012
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  4. 4

    Quantum cryptography potentially perfect security.

    I whakaputaina 2003
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  5. 5

    Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters / Futral, William, Greene, James

    I whakaputaina 2013
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  6. 6

    Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters / Futral, William, Greene, James

    I whakaputaina 2013
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  7. 7

    Managing Risk and Information Security Protect to Enable / Harkins, Malcolm

    I whakaputaina 2013
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  8. 8

    Building the Infrastructure for Cloud Security A Solutions view / Yeluri, Raghu, Castro-Leon, Enrique

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  9. 9

    The InfoSec Handbook An Introduction to Information Security / Rao, Umesh Hodeghatta, Nayak, Umesha

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  10. 10

    Managing Risk and Information Security Protect to Enable / Harkins, Malcolm

    I whakaputaina 2013
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  11. 11

    Building the Infrastructure for Cloud Security A Solutions view / Yeluri, Raghu, Castro-Leon, Enrique

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  12. 12

    The InfoSec Handbook An Introduction to Information Security / Rao, Umesh Hodeghatta, Nayak, Umesha

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  13. 13

    The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value / Dennedy, Michelle Finneran, Fox, Jonathan, Finneran, Thomas R.

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  14. 14

    Platform Embedded Security Technology Revealed Ruan, Xiaoyu

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  15. 15

    A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security / Arthur, Will, Challener, David, Goldman, Kenneth

    I whakaputaina 2015
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  16. 16

    The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value / Dennedy, Michelle Finneran, Fox, Jonathan, Finneran, Thomas R.

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  17. 17

    Platform Embedded Security Technology Revealed Ruan, Xiaoyu

    I whakaputaina 2014
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  18. 18

    A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security / Arthur, Will, Challener, David, Goldman, Kenneth

    I whakaputaina 2015
    Ngā marau: “…Data Encryption.…”
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  19. 19

    Identity-based cryptography

    I whakaputaina 2009
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  20. 20

    Color image watermarking : algorithms and technologies / Su, Qingtang

    I whakaputaina 2017
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka