Search ResultsElectronic Resources 
by
Martin, Luther.
Format:
Excerpt:
Data encryption (Computer science)
by
Furnell, Steven, 1970-
Format:
Excerpt:
Data encryption (Computer science)
by
Krishnamurthy Madwachar, Mohan.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492072
Format:
Excerpt:
following three-part structure in mind: locking down the network, securing data passing across the network
by
Crowley, Patrick, 1974-
ScienceDirect http://www.sciencedirect.com/science/book/9781558608757
Format:
Excerpt:
-specific processors, such as classification and encryption engines, to more general-purpose packet or communications
by
Kanclirz, Jan.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492577
Format:
Excerpt:
Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set
by
Celko, Joe.
ScienceDirect http://www.sciencedirect.com/science/book/9780123741370
Format:
Excerpt:
Encryption via Tables -- 8.2 Check Digits via Tables -- 8.2.1 Check Digits Defi ned -- 8.2.2 Error Detection

Select an Action





