Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
77 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Kim, Daehee. author.
      Format: 
      Excerpt: 
      displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small
      by 
      Krishnamurthy Madwachar, Mohan.
      Format: 
      Excerpt: 
      following three-part structure in mind: locking down the network, securing data passing across the network
      by 
      Tsoutsos, Nektarios Georgios, author.
      Format: 
      Excerpt: 
      directly in encrypted form, using the power of additive homomorphic encryption. Our objective is to support
      by 
      Dey, Nilanjan. editor.
      Format: 
      Excerpt: 
      offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption
      by 
      Thames, Lane. editor.
      Format: 
      Excerpt: 
      Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Excerpt: 
      Preservation in Cloud Computing with Double Encryption Method -- A Machine learning based approach for Opinion
      by 
      Wayner, Peter, 1964-
      Format: 
      Excerpt: 
      . These methods include encryption, compression, data embedding and watermarking, data mimicry, and
      by 
      Chandra, Praphul.
      Format: 
      Excerpt: 
      desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
      by 
      Vacca, John R.
      Format: 
      Excerpt: 
      deploying firewalls, data encryption and decryption and other countermeasures.
      by 
      Reid, Fiach.
      Format: 
      Excerpt: 
      -- Protecting data : encryption -- Controlling user access : authentication and authorization -- Programming for
      by 
      Gallo, Michael A.
      Format: 
      Excerpt: 
      infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES