Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
77 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Wayner, Peter, 1964-
      Format: 
      Excerpt: 
      different techniques to hide information. These include encryption, making data incomprehensible
      by 
      Stefanek, George L.
      Format: 
      Excerpt: 
      And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
      by 
      Crowley, Patrick, 1974-
      Format: 
      Excerpt: 
      -specific processors, such as classification and encryption engines, to more general-purpose packet or communications
      by 
      Edmundson, Anne Marissa, author.
      Format: 
      Excerpt: 
      . Existing protocol encryption such as TLS is not sufficient, since a wide range of data, from DNS lookups to
      by 
      Agrawal, Dharma Prakash. author.
      Format: 
      Excerpt: 
      Connectivity for Random Deployment -- Chapter-10: Medium Access and Routing -- Chapter-11: Broadcasting, Data
      by 
      Vacca, John R.
      Format: 
      Excerpt: 
      encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy
      by 
      Kanclirz, Jan.
      Format: 
      Excerpt: 
      Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set
      by 
      International Meeting on Applied Physics (1st : 2003 : Badajoz, Spain)
      Format: 
      Excerpt: 
      Workers - Ethical Issues. Chaotic Data Encryption for Optical Communications.
      by 
      Burnett, Mark (Mark M.)
      Format: 
      Excerpt: 
      ; ; Introduction; ; Applying XML Encryption; ; Encrypting XML Data; ; Applying XML Digital Signatures; ; Signing
      by 
      Bidgoli, Hossein.
      Format: 
      Excerpt: 
      -Oriented Data Model -- Data versus Information -- Data Warehousing and Data Marts -- Database Administration
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Excerpt: 
      Environment -- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless