Ngā hua rapu - "Data Encryption."
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Data encryption (Computer science) 35
- Computer security 11
- Data Encryption 9
- Security measures 9
- Computer science 8
- Computer Science 7
- Computer networks 7
- Cryptography 6
- Computers 5
- Law and legislation 4
- Access control 3
- Coding theory 3
- Information Systems and Communication Service 3
- Software Engineering/Programming and Operating Systems 3
- Software engineering 3
- Wiretapping 3
- Electronic information resources 2
- Electronic surveillance 2
- Embedded computer systems 2
- Political aspects 2
- Privacy, Right of 2
- Public key cryptography 2
- Telecommunication 2
- Aspect politique 1
- Business Information Systems 1
- Certification 1
- Cloud computing 1
- Coding and Information Theory 1
- Computer crimes 1
- Computers and Society 1
-
1
Quantum cryptography potentially perfect security.
I whakaputaina 2003Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
2
Cryptography protocols, design and applications /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
3
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
I whakaputaina 2013Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
4
Managing Risk and Information Security Protect to Enable /
I whakaputaina 2013Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
5
Building the Infrastructure for Cloud Security A Solutions view /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
6
The InfoSec Handbook An Introduction to Information Security /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
7
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
8
Platform Embedded Security Technology Revealed
I whakaputaina 2014Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
9
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
I whakaputaina 2015Ngā marau: “…Data Encryption.…”
Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
10
Identity-based cryptography
I whakaputaina 2009Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
11
Color image watermarking : algorithms and technologies /
I whakaputaina 2017Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
12
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
13
Machine learning in image steganalysis
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
14
Video encryption technology and application
I whakaputaina 2010Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
15
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
I whakaputaina 2015Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
16
Trusted platform module basics using TPM in embedded systems /
I whakaputaina 2006Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
17
Implementing SSH strategies for optimizing the Secure Shell /
I whakaputaina 2004Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
18
Securing information and communications systems principles, technologies, and applications /
I whakaputaina 2008Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
19
Modelling cyber security approaches, methodology, strategies /
I whakaputaina 2009Ngā marau: “…Data encryption (Computer science) Congresses.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko Mauhanga Hui īPukapuka -
20
Hashing in computer science fifty years of slicing and dicing /
I whakaputaina 2010Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka