Хайлтын үр дүнгүүд - "Data encryption (Computer science)."

Үр дүнг сайжруулах
  1. 1

    Quantum cryptography potentially perfect security.

    Хэвлэсэн 2003
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  2. 2

    Cryptography protocols, design and applications /

    Хэвлэсэн 2012
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  3. 3

    Cryptography protocols, design and applications /

    Хэвлэсэн 2012
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  4. 4

    Quantum cryptography potentially perfect security.

    Хэвлэсэн 2003
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  5. 5

    Identity-based cryptography

    Хэвлэсэн 2009
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  6. 6

    Color image watermarking : algorithms and technologies / Su, Qingtang

    Хэвлэсэн 2017
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  7. 7

    Identity-based cryptography

    Хэвлэсэн 2009
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  8. 8

    Color image watermarking : algorithms and technologies / Su, Qingtang

    Хэвлэсэн 2017
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  9. 9

    Burdens of proof cryptographic culture and evidence law in the age of electronic documents / Blanchette, Jean-François

    Хэвлэсэн 2012
    Нөхцлүүд: “…Data encryption (Computer science) Law and legislation.…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  10. 10

    Machine learning in image steganalysis Schaathun, Hans Georg

    Хэвлэсэн 2012
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  11. 11

    Video encryption technology and application Xu, Zhengquan, 1962-

    Хэвлэсэн 2010
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  12. 12

    Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond / Salam, Abdul

    Хэвлэсэн 2015
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  13. 13

    Burdens of proof cryptographic culture and evidence law in the age of electronic documents / Blanchette, Jean-François

    Хэвлэсэн 2012
    Нөхцлүүд: “…Data encryption (Computer science) Law and legislation.…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  14. 14

    Machine learning in image steganalysis Schaathun, Hans Georg

    Хэвлэсэн 2012
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  15. 15

    Video encryption technology and application Xu, Zhengquan, 1962-

    Хэвлэсэн 2010
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  16. 16

    Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond / Salam, Abdul

    Хэвлэсэн 2015
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  17. 17

    Trusted platform module basics using TPM in embedded systems / Kinney, Steven

    Хэвлэсэн 2006
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  18. 18

    Trusted platform module basics using TPM in embedded systems / Kinney, Steven

    Хэвлэсэн 2006
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  19. 19

    Implementing SSH strategies for optimizing the Secure Shell / Dwivedi, Himanshu

    Хэвлэсэн 2004
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном
  20. 20

    Securing information and communications systems principles, technologies, and applications /

    Хэвлэсэн 2008
    Нөхцлүүд: “…Data encryption (Computer science)…”
    An electronic book accessible through the World Wide Web; click to view
    Цахим Цахим ном