Search ResultsElektronik Kaynaklar 
Arama Sonuçlarını Sınırlandır
by
Loshin, Pete.
Format:
Alıntı:
Simple steps to data encryption a practical guide to secure computing / Loshin, Pete.
by
Cusick, Thomas W., author.
Format:
Alıntı:
Data encryption (Computer science)
by
Katzenbeisser, Stefan, author.
Format:
Alıntı:
Data encryption (Computer science)
by
Laud, Peeter, editor.
Format:
Alıntı:
Data encryption (Computer science)
by
Lek, Kamol.
Format:
Alıntı:
Data encryption (Computer science)
by
Joye, Marc, 1969-
Format:
Alıntı:
Data encryption (Computer science)
by
Martin, Luther.
Format:
Alıntı:
Data encryption (Computer science)
by
ProQuest (Firm)
Format:
Alıntı:
Data encryption (Computer science)
by
Su, Qingtang, author.
Format:
Alıntı:
Data encryption (Computer science)
by
Salam, Abdul, author.
Format:
Alıntı:
Data encryption (Computer science)
by
Curley, Robert.
Format:
Alıntı:
Data encryption (Computer science)
by
Cao, Zhenfu.
Format:
Alıntı:
Data encryption (Computer science)
by
Demir, Bünyamin
Format:
Alıntı:
Data encryption (Computer science).
by
Lu, Zhe-Ming, author.
Format:
Alıntı:
Data encryption (Computer science)
by
Tokareva, Natalia, author.
Format:
Alıntı:
Data encryption (Computer science)
by
Schaathun, Hans Georg.
Format:
Alıntı:
Data encryption (Computer science)
by
Sakiyama, Kazuo, 1971- author.
Format:
Alıntı:
Data encryption (Computer science)
by
Franco, Pedro, author.
Format:
Alıntı:
Data encryption (Computer science)
by
Blanchette, Jean-François.
Format:
Alıntı:
Data encryption (Computer science) -- Law and legislation.
by
Cimato, Stelvio.
Format:
Alıntı:
Data encryption (Computer science)
by
McAndrew, Alasdair, author.
Format:
Alıntı:
Data encryption (Computer science)
by
Landau, Susan Eva.
Format:
Alıntı:
Data encryption (Computer science) -- Government policy -- United States.
by
Zhang, Rui.
Format:
Alıntı:
Data encryption (Computer science)
by
Konheim, Alan G., 1934-
Format:
Alıntı:
Data encryption (Computer science)
by
Diffie, Whitfield.
Format:
Alıntı:
Data encryption (Computer science) -- Law and legislation -- United States.
by
Kinney, Steven.
Format:
Alıntı:
Data encryption (Computer science)
by
Axelrod, C. Warren.
Format:
Alıntı:
Data encryption (Computer science)
by
ProQuest (Firm)
Format:
Alıntı:
Data encryption (Computer science)
by
El Mrabet, Nadia, editor.
Format:
Alıntı:
Data encryption (Computer science) -- Mathematics.
by
Horodecki, Ryszard.
Format:
Alıntı:
Data encryption (Computer science)
by
Xu, Zhengquan, 1962-
Format:
Alıntı:
Data encryption (Computer science)
by
NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)
Format:
Alıntı:
Data encryption (Computer science) -- Congresses.
by
Furnell, Steven, 1970-
Format:
Alıntı:
Data encryption (Computer science)
by
Dwivedi, Himanshu.
Format:
Alıntı:
Data encryption (Computer science)
by
Bayer, Chad M.
Format:
Alıntı:
Data encryption (Computer science) -- Examinations -- Study guides.
by
Nematollahi, Mohammad Ali. author.
Format:
Alıntı:
Data encryption (Computer science).
by
Borges de Oliveira, Fábio. author.
Format:
Alıntı:
Data encryption (Computer science).
by
Zhu, Liehuang. author.
Format:
Alıntı:
Data encryption (Computer science).
by
Cusick, Thomas W., 1943-
ScienceDirect http://www.sciencedirect.com/science/book/9780123748904
Format:
Alıntı:
Data encryption (Computer science)
by
Sencar, Husrev T.
ScienceDirect http://www.sciencedirect.com/science/book/9780120471447
Format:
Alıntı:
Data encryption (Computer science)
by
Forte, Domenic. editor.
Format:
Alıntı:
Data encryption (Computer science).
by
Mishra, Prabhat. editor.
Format:
Alıntı:
Data encryption (Computer science).
by
Liu, Dale.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492836
Format:
Alıntı:
Data encryption (Computer science)
by
Grzenda, Maciej. editor.
Format:
Alıntı:
networks, photonic data transport networks, security policies, credentials management, data encryption for
ScienceDirect http://www.sciencedirect.com/science/book/9781597491969
Format:
Alıntı:
: Administrative Roles -- 10: Auditing Triggers -- 11: Data Encryption -- 12: Securing Reporting/Analysis Services.
by
Winder, Steve.
ScienceDirect https://www.sciencedirect.com/science/book/9780750656085
Format:
Alıntı:
; Radio equipment; Microwave communication; Information privacy and encryption; Multiplexing; Speech
by
Langenberg, Brandon Wade, author.
Format:
Alıntı:
interest. In the area of cryptography, some encryption schemes (such as RSA) are already deemed broken by
by
Kim, Daehee. author.
Format:
Alıntı:
displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small
by
Krishnamurthy Madwachar, Mohan.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492072
Format:
Alıntı:
following three-part structure in mind: locking down the network, securing data passing across the network
by
Tsoutsos, Nektarios Georgios, author.
Format:
Alıntı:
directly in encrypted form, using the power of additive homomorphic encryption. Our objective is to support
by
Burney, Micaela L., author.
Format:
Alıntı:
or hiding data inside other data. A combination of steganography and encryption can be used for an
by
Thames, Lane. editor.
Format:
Alıntı:
Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized
by
Dey, Nilanjan. editor.
Format:
Alıntı:
offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption
by
Satapathy, Suresh Chandra. editor.
Format:
Alıntı:
Preservation in Cloud Computing with Double Encryption Method -- A Machine learning based approach for Opinion
by
Wayner, Peter, 1964-
ScienceDirect https://www.sciencedirect.com/science/book/9780123744791
Format:
Alıntı:
. These methods include encryption, compression, data embedding and watermarking, data mimicry, and
by
Vacca, John R.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582975
Format:
Alıntı:
deploying firewalls, data encryption and decryption and other countermeasures.
by
Chandra, Praphul.
ScienceDirect http://www.sciencedirect.com/science/book/9780750677462
Format:
Alıntı:
desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
by
Reid, Fiach.
ScienceDirect https://www.sciencedirect.com/science/book/9781555583156
Format:
Alıntı:
-- Protecting data : encryption -- Controlling user access : authentication and authorization -- Programming for
by
Gallo, Michael A.
ScienceDirect http://www.sciencedirect.com/science/book/9781555582524
Format:
Alıntı:
infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES
by
Wayner, Peter, 1964-
ScienceDirect http://www.sciencedirect.com/science/book/9781558607699
Format:
Alıntı:
different techniques to hide information. These include encryption, making data incomprehensible
by
Stefanek, George L.
ScienceDirect https://www.sciencedirect.com/science/book/9781878707963
Format:
Alıntı:
And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
by
Crowley, Patrick, 1974-
ScienceDirect http://www.sciencedirect.com/science/book/9781558608757
Format:
Alıntı:
-specific processors, such as classification and encryption engines, to more general-purpose packet or communications
by
Edmundson, Anne Marissa, author.
Format:
Alıntı:
. Existing protocol encryption such as TLS is not sufficient, since a wide range of data, from DNS lookups to
by
Agrawal, Dharma Prakash. author.
Format:
Alıntı:
Connectivity for Random Deployment -- Chapter-10: Medium Access and Routing -- Chapter-11: Broadcasting, Data
by
Vacca, John R.
ScienceDirect https://www.sciencedirect.com/science/book/9780123743541
Format:
Alıntı:
encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy
by
Salifu, Abdul-Mumin, author.
Format:
Alıntı:
of data encryption in the second stage of encryption. MRC is employed to build a reverse converter
by
Kanclirz, Jan.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492577
Format:
Alıntı:
Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set
by
International Meeting on Applied Physics (1st : 2003 : Badajoz, Spain)
ScienceDirect http://www.sciencedirect.com/science/book/9780080446486
Format:
Alıntı:
Workers - Ethical Issues. Chaotic Data Encryption for Optical Communications.
by
Burnett, Mark (Mark M.)
ScienceDirect http://www.sciencedirect.com/science/book/9781932266658
Format:
Alıntı:
; ; Introduction; ; Applying XML Encryption; ; Encrypting XML Data; ; Applying XML Digital Signatures; ; Signing
by
Bidgoli, Hossein.
Format:
Alıntı:
-Oriented Data Model -- Data versus Information -- Data Warehousing and Data Marts -- Database Administration
by
Satapathy, Suresh Chandra. editor.
Format:
Alıntı:
Environment -- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless
by
Satapathy, Suresh Chandra. editor.
Format:
Alıntı:
Anonymization: Hybridizing Data Restructure with Feature Set Partitioning for Privacy Preserving in Supervised
by
Modi, Nilesh. editor.
Format:
Alıntı:
. EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS
by
Cummins, Fred.
ScienceDirect https://www.sciencedirect.com/science/book/9780123744456
Format:
Alıntı:
-- Agile enterprise requirements -- Logical data model -- Data exchange -- Business intelligence services
by
Su, Wencong.
Format:
Alıntı:
- Emerging data encryption methods applicable to Energy Internet -- 8.1 Introduction -- 8.2 Importance of
by
Celko, Joe.
ScienceDirect http://www.sciencedirect.com/science/book/9780123741370
Format:
Alıntı:
Encryption via Tables -- 8.2 Check Digits via Tables -- 8.2.1 Check Digits Defi ned -- 8.2.2 Error Detection

Eylem Seç




