Ngā hua rapu - "Data encryption (Computer science)."
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Data encryption (Computer science) 72
- Computer security 22
- Data Encryption 18
- Security measures 18
- Computer science 16
- Computer Science 14
- Computer networks 14
- Cryptography 13
- Computers 10
- Law and legislation 9
- Access control 6
- Coding theory 6
- Information Systems and Communication Service 6
- Software Engineering/Programming and Operating Systems 6
- Software engineering 6
- Wiretapping 6
- Electronic information resources 4
- Electronic surveillance 4
- Embedded computer systems 4
- Political aspects 4
- Privacy, Right of 4
- Public key cryptography 4
- Telecommunication 4
- Aspect politique 2
- Business Information Systems 2
- Certification 2
- Cloud computing 2
- Coding and Information Theory 2
- Computer crimes 2
- Computers and Society 2
-
1
Quantum cryptography potentially perfect security.
I whakaputaina 2003Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
2
Cryptography protocols, design and applications /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
3
Cryptography protocols, design and applications /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
4
Quantum cryptography potentially perfect security.
I whakaputaina 2003Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
5
Identity-based cryptography
I whakaputaina 2009Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
6
Color image watermarking : algorithms and technologies /
I whakaputaina 2017Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
7
Identity-based cryptography
I whakaputaina 2009Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
8
Color image watermarking : algorithms and technologies /
I whakaputaina 2017Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
9
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
10
Machine learning in image steganalysis
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
11
Video encryption technology and application
I whakaputaina 2010Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
12
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
I whakaputaina 2015Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
13
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
14
Machine learning in image steganalysis
I whakaputaina 2012Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
15
Video encryption technology and application
I whakaputaina 2010Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
16
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
I whakaputaina 2015Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
17
Trusted platform module basics using TPM in embedded systems /
I whakaputaina 2006Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
18
Trusted platform module basics using TPM in embedded systems /
I whakaputaina 2006Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
19
Implementing SSH strategies for optimizing the Secure Shell /
I whakaputaina 2004Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
20
Securing information and communications systems principles, technologies, and applications /
I whakaputaina 2008Ngā marau: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka