Ngā hua rapu - "Data Encryption."
-
1
Quantum cryptography potentially perfect security.
I whakaputaina 2003Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
2
Cryptography protocols, design and applications /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
3
Cryptography protocols, design and applications /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
4
Quantum cryptography potentially perfect security.
I whakaputaina 2003Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
5
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
I whakaputaina 2013Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
6
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
I whakaputaina 2013Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
7
Managing Risk and Information Security Protect to Enable /
I whakaputaina 2013Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
8
Building the Infrastructure for Cloud Security A Solutions view /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
9
The InfoSec Handbook An Introduction to Information Security /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
10
Managing Risk and Information Security Protect to Enable /
I whakaputaina 2013Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
11
Building the Infrastructure for Cloud Security A Solutions view /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
12
The InfoSec Handbook An Introduction to Information Security /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
13
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
14
Platform Embedded Security Technology Revealed
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
15
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
I whakaputaina 2015Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
16
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
17
Platform Embedded Security Technology Revealed
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
18
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
I whakaputaina 2015Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
19
Identity-based cryptography
I whakaputaina 2009Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
20
Color image watermarking : algorithms and technologies /
I whakaputaina 2017Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka