Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
Shelf Location
56 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Liu, Dale.
      Format: 
      Excerpt: 
      Data encryption (Computer science)
      Format: 
      Excerpt: 
      : Administrative Roles -- 10: Auditing Triggers -- 11: Data Encryption -- 12: Securing Reporting/Analysis Services.
      by 
      Winder, Steve.
      Format: 
      Excerpt: 
      ; Radio equipment; Microwave communication; Information privacy and encryption; Multiplexing; Speech
      by 
      Krishnamurthy Madwachar, Mohan.
      Format: 
      Excerpt: 
      following three-part structure in mind: locking down the network, securing data passing across the network
      by 
      Wayner, Peter, 1964-
      Format: 
      Excerpt: 
      . These methods include encryption, compression, data embedding and watermarking, data mimicry, and
      by 
      Chandra, Praphul.
      Format: 
      Excerpt: 
      desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
      by 
      Vacca, John R.
      Format: 
      Excerpt: 
      deploying firewalls, data encryption and decryption and other countermeasures.
      by 
      Reid, Fiach.
      Format: 
      Excerpt: 
      -- Protecting data : encryption -- Controlling user access : authentication and authorization -- Programming for
      by 
      Gallo, Michael A.
      Format: 
      Excerpt: 
      infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES
      by 
      Wayner, Peter, 1964-
      Format: 
      Excerpt: 
      different techniques to hide information. These include encryption, making data incomprehensible
      by 
      Stefanek, George L.
      Format: 
      Excerpt: 
      And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
      by 
      Crowley, Patrick, 1974-
      Format: 
      Excerpt: 
      -specific processors, such as classification and encryption engines, to more general-purpose packet or communications