Zoekresultaten - "Data encryption (Computer science)."
-
1
Quantum cryptography potentially perfect security.
Gepubliceerd in 2003Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
2
Cryptography protocols, design and applications /
Gepubliceerd in 2012Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
3
Cryptography protocols, design and applications /
Gepubliceerd in 2012Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
4
Quantum cryptography potentially perfect security.
Gepubliceerd in 2003Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
5
Identity-based cryptography
Gepubliceerd in 2009Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
6
Color image watermarking : algorithms and technologies /
Gepubliceerd in 2017Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
7
Identity-based cryptography
Gepubliceerd in 2009Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
8
Color image watermarking : algorithms and technologies /
Gepubliceerd in 2017Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
9
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Gepubliceerd in 2012Onderwerpen: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
10
Machine learning in image steganalysis
Gepubliceerd in 2012Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
11
Video encryption technology and application
Gepubliceerd in 2010Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
12
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Gepubliceerd in 2015Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
13
Burdens of proof cryptographic culture and evidence law in the age of electronic documents /
Gepubliceerd in 2012Onderwerpen: “…Data encryption (Computer science) Law and legislation.…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
14
Machine learning in image steganalysis
Gepubliceerd in 2012Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
15
Video encryption technology and application
Gepubliceerd in 2010Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
16
Deploying and managing a cloud infrastructure : real world skills for the CompTIA cloud+ certification and beyond /
Gepubliceerd in 2015Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
17
Trusted platform module basics using TPM in embedded systems /
Gepubliceerd in 2006Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
18
Trusted platform module basics using TPM in embedded systems /
Gepubliceerd in 2006Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
19
Implementing SSH strategies for optimizing the Secure Shell /
Gepubliceerd in 2004Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek -
20
Securing information and communications systems principles, technologies, and applications /
Gepubliceerd in 2008Onderwerpen: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektronisch E-boek