Ohcanbohtosat - "Data Encryption."
Fáddáevttohusat
Fáddáevttohusat
- Data encryption (Computer science) 72
- Computer security 22
- Data Encryption 18
- Security measures 18
- Computer science 16
- Computer Science 14
- Computer networks 14
- Cryptography 13
- Computers 10
- Law and legislation 9
- Access control 6
- Coding theory 6
- Information Systems and Communication Service 6
- Software Engineering/Programming and Operating Systems 6
- Software engineering 6
- Wiretapping 6
- Electronic information resources 4
- Electronic surveillance 4
- Embedded computer systems 4
- Political aspects 4
- Privacy, Right of 4
- Public key cryptography 4
- Telecommunication 4
- Aspect politique 2
- Business Information Systems 2
- Certification 2
- Cloud computing 2
- Coding and Information Theory 2
- Computer crimes 2
- Computers and Society 2
-
1
Quantum cryptography potentially perfect security.
Almmustuhtton 2003Fáttát: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
2
Cryptography protocols, design and applications /
Almmustuhtton 2012Fáttát: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
3
Cryptography protocols, design and applications /
Almmustuhtton 2012Fáttát: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
4
Quantum cryptography potentially perfect security.
Almmustuhtton 2003Fáttát: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
5
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Almmustuhtton 2013Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
6
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Almmustuhtton 2013Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
7
Managing Risk and Information Security Protect to Enable /
Almmustuhtton 2013Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
8
Building the Infrastructure for Cloud Security A Solutions view /
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
9
The InfoSec Handbook An Introduction to Information Security /
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
10
Managing Risk and Information Security Protect to Enable /
Almmustuhtton 2013Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
11
Building the Infrastructure for Cloud Security A Solutions view /
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
12
The InfoSec Handbook An Introduction to Information Security /
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
13
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
14
Platform Embedded Security Technology Revealed
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
15
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Almmustuhtton 2015Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
16
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
17
Platform Embedded Security Technology Revealed
Almmustuhtton 2014Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
18
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Almmustuhtton 2015Fáttát: “…Data Encryption.…”
Viečča ollesdeavstta
Elektrovnnalaš E-girji -
19
Identity-based cryptography
Almmustuhtton 2009Fáttát: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
20
Color image watermarking : algorithms and technologies /
Almmustuhtton 2017Fáttát: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji