Search Results - "Data Encryption."
-
1
Quantum cryptography potentially perfect security.
Published 2003Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Cryptography protocols, design and applications /
Published 2012Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Cryptography protocols, design and applications /
Published 2012Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Quantum cryptography potentially perfect security.
Published 2003Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Published 2013Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
6
Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters /
Published 2013Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
7
Managing Risk and Information Security Protect to Enable /
Published 2013Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
8
Building the Infrastructure for Cloud Security A Solutions view /
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
9
The InfoSec Handbook An Introduction to Information Security /
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
10
Managing Risk and Information Security Protect to Enable /
Published 2013Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
11
Building the Infrastructure for Cloud Security A Solutions view /
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
12
The InfoSec Handbook An Introduction to Information Security /
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
13
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
14
Platform Embedded Security Technology Revealed
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
15
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Published 2015Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
16
The Privacy Engineer’s Manifesto Getting from Policy to Code to QA to Value /
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
17
Platform Embedded Security Technology Revealed
Published 2014Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
18
A Practical Guide to TPM 2.0 Using the New Trusted Platform Module in the New Age of Security /
Published 2015Subjects: “…Data Encryption.…”
Get full text
Electronic eBook -
19
Identity-based cryptography
Published 2009Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Color image watermarking : algorithms and technologies /
Published 2017Subjects: “…Data encryption (Computer science)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook