Canlyniadau Chwilio - "Data encryption (Computer science)."

  1. 21

    Modelling cyber security approaches, methodology, strategies /

    Cyhoeddwyd 2009
    Pynciau: “...Data encryption (Computer science) Congresses....”
    An electronic book accessible through the World Wide Web; click to view
    Electronig Trafodyn Cynhadledd eLyfr
  2. 22

    Hashing in computer science fifty years of slicing and dicing / gan Konheim, Alan G., 1934-

    Cyhoeddwyd 2010
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  3. 23

    Understanding bitcoin : cryptography, engineering and economics. / gan Franco, Pedro

    Cyhoeddwyd 2015
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  4. 24

    Securing information and communications systems principles, technologies, and applications /

    Cyhoeddwyd 2008
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  5. 25

    Modelling cyber security approaches, methodology, strategies /

    Cyhoeddwyd 2009
    Pynciau: “...Data encryption (Computer science) Congresses....”
    An electronic book accessible through the World Wide Web; click to view
    Electronig Trafodyn Cynhadledd eLyfr
  6. 26

    Hashing in computer science fifty years of slicing and dicing / gan Konheim, Alan G., 1934-

    Cyhoeddwyd 2010
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  7. 27

    Understanding bitcoin : cryptography, engineering and economics. / gan Franco, Pedro

    Cyhoeddwyd 2015
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  8. 28

    Implementing SSH strategies for optimizing the Secure Shell / gan Dwivedi, Himanshu

    Cyhoeddwyd 2004
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  9. 29

    A comparison between smart cards and trusted platform modules in business scenarios gan Murhammer, Martin W.

    Cyhoeddwyd 2008
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  10. 30

    A comparison between smart cards and trusted platform modules in business scenarios gan Murhammer, Martin W.

    Cyhoeddwyd 2008
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  11. 31

    Cryptography and network security : principles and practice / gan Stallings, William

    Cyhoeddwyd 2006
    Pynciau: “...Data encryption (Computer science)...”
    Llyfr
  12. 32

    Introduction to identity-based encryption gan Martin, Luther

    Cyhoeddwyd 2008
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  13. 33

    Introduction to identity-based encryption gan Martin, Luther

    Cyhoeddwyd 2008
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  14. 34

    Cryptography and network security : principles and practice / gan Stallings, William

    Cyhoeddwyd 2006
    Pynciau: “...Data encryption (Computer science)...”
    Llyfr
  15. 35

    Quantum cryptography and computing theory and implementation /

    Cyhoeddwyd 2010
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  16. 36

    Quantum cryptography and computing theory and implementation /

    Cyhoeddwyd 2010
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  17. 37

    Relation based access control / gan Zhang, Rui

    Cyhoeddwyd 2010
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  18. 38

    Relation based access control / gan Zhang, Rui

    Cyhoeddwyd 2010
    Pynciau: “...Data encryption (Computer science)...”
    An electronic book accessible through the World Wide Web; click to view
    Electronig eLyfr
  19. 39

    Intel® Trusted Execution Technology for Server Platforms A Guide to More Secure Datacenters / gan Futral, William, Greene, James

    Cyhoeddwyd 2013
    Pynciau: “...Data encryption (Computer science)....”
    Cael y testun llawn
    Electronig eLyfr
  20. 40

    Managing risk and information security : protect to enable / gan Harkins, Malcolm W

    Cyhoeddwyd 2016
    Pynciau: “...Data encryption (Computer science) 928...”
    Llyfr