Search ResultsElectronic Resources 
by
Liu, Dale.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492836
Format:
Excerpt:
Data encryption (Computer science)
ScienceDirect http://www.sciencedirect.com/science/book/9781597491969
Format:
Excerpt:
: Administrative Roles -- 10: Auditing Triggers -- 11: Data Encryption -- 12: Securing Reporting/Analysis Services.
by
Winder, Steve.
ScienceDirect https://www.sciencedirect.com/science/book/9780750656085
Format:
Excerpt:
; Radio equipment; Microwave communication; Information privacy and encryption; Multiplexing; Speech
by
Krishnamurthy Madwachar, Mohan.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492072
Format:
Excerpt:
following three-part structure in mind: locking down the network, securing data passing across the network
by
Wayner, Peter, 1964-
ScienceDirect https://www.sciencedirect.com/science/book/9780123744791
Format:
Excerpt:
. These methods include encryption, compression, data embedding and watermarking, data mimicry, and
by
Chandra, Praphul.
ScienceDirect http://www.sciencedirect.com/science/book/9780750677462
Format:
Excerpt:
desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
by
Vacca, John R.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582975
Format:
Excerpt:
deploying firewalls, data encryption and decryption and other countermeasures.
by
Reid, Fiach.
ScienceDirect https://www.sciencedirect.com/science/book/9781555583156
Format:
Excerpt:
-- Protecting data : encryption -- Controlling user access : authentication and authorization -- Programming for
by
Gallo, Michael A.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582524
Format:
Excerpt:
infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES
by
Wayner, Peter, 1964-
ScienceDirect http://www.sciencedirect.com/science/book/9781558607699
Format:
Excerpt:
different techniques to hide information. These include encryption, making data incomprehensible
by
Stefanek, George L.
ScienceDirect https://www.sciencedirect.com/science/book/9781878707963
Format:
Excerpt:
And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
by
Crowley, Patrick, 1974-
ScienceDirect http://www.sciencedirect.com/science/book/9781558608757
Format:
Excerpt:
-specific processors, such as classification and encryption engines, to more general-purpose packet or communications

Select an Action





