Ngā hua rapu - "Data encryption (Computer science)"

Whakamahine hua
  1. 1

    Quantum cryptography potentially perfect security.

    I whakaputaina 2003
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  2. 2

    Cryptography protocols, design and applications /

    I whakaputaina 2012
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  3. 3

    Identity-based cryptography

    I whakaputaina 2009
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  4. 4

    Color image watermarking : algorithms and technologies / Su, Qingtang

    I whakaputaina 2017
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  5. 5

    Burdens of proof cryptographic culture and evidence law in the age of electronic documents / Blanchette, Jean-François

    I whakaputaina 2012
    Ngā marau: “…Data encryption (Computer science) Law and legislation.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  6. 6

    Machine learning in image steganalysis Schaathun, Hans Georg

    I whakaputaina 2012
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  7. 7

    Video encryption technology and application Xu, Zhengquan, 1962-

    I whakaputaina 2010
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  8. 8

    Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond / Salam, Abdul

    I whakaputaina 2015
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  9. 9

    Trusted platform module basics using TPM in embedded systems / Kinney, Steven

    I whakaputaina 2006
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  10. 10

    Implementing SSH strategies for optimizing the Secure Shell / Dwivedi, Himanshu

    I whakaputaina 2004
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  11. 11

    Securing information and communications systems principles, technologies, and applications /

    I whakaputaina 2008
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  12. 12

    Modelling cyber security approaches, methodology, strategies /

    I whakaputaina 2009
    Ngā marau: “…Data encryption (Computer science) Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko Mauhanga Hui īPukapuka
  13. 13

    Hashing in computer science fifty years of slicing and dicing / Konheim, Alan G., 1934-

    I whakaputaina 2010
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  14. 14

    Understanding bitcoin : cryptography, engineering and economics. / Franco, Pedro

    I whakaputaina 2015
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  15. 15

    A comparison between smart cards and trusted platform modules in business scenarios Murhammer, Martin W.

    I whakaputaina 2008
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  16. 16

    Cryptography and network security : principles and practice / Stallings, William

    I whakaputaina 2006
    Ngā marau: “…Data encryption (Computer science)…”
    Pukapuka
  17. 17

    Introduction to identity-based encryption Martin, Luther

    I whakaputaina 2008
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  18. 18

    Quantum cryptography and computing theory and implementation /

    I whakaputaina 2010
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  19. 19

    Relation based access control / Zhang, Rui

    I whakaputaina 2010
    Ngā marau: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Tāhiko īPukapuka
  20. 20

    Managing risk and information security : protect to enable / Harkins, Malcolm W

    I whakaputaina 2016
    Ngā marau: “…Data encryption (Computer science) 928…”
    Pukapuka