Search ResultsElektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Yazar
Materyal Türü
Dil
Konu
Kütüphane
77 sonuç bulundu Arama sonuçlarına abone ol
000000000000DEFAULTTR
Yazdır
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
    Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
      by 
      Kim, Daehee. author.
      Format: 
      Alıntı: 
      displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small
      by 
      Krishnamurthy Madwachar, Mohan.
      Format: 
      Alıntı: 
      following three-part structure in mind: locking down the network, securing data passing across the network
      by 
      Tsoutsos, Nektarios Georgios, author.
      Format: 
      Alıntı: 
      directly in encrypted form, using the power of additive homomorphic encryption. Our objective is to support
      by 
      Dey, Nilanjan. editor.
      Format: 
      Alıntı: 
      offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption
      by 
      Thames, Lane. editor.
      Format: 
      Alıntı: 
      Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Alıntı: 
      Preservation in Cloud Computing with Double Encryption Method -- A Machine learning based approach for Opinion
      by 
      Wayner, Peter, 1964-
      Format: 
      Alıntı: 
      . These methods include encryption, compression, data embedding and watermarking, data mimicry, and
      by 
      Chandra, Praphul.
      Format: 
      Alıntı: 
      desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
      by 
      Vacca, John R.
      Format: 
      Alıntı: 
      deploying firewalls, data encryption and decryption and other countermeasures.
      by 
      Reid, Fiach.
      Format: 
      Alıntı: 
      -- Protecting data : encryption -- Controlling user access : authentication and authorization -- Programming for
      by 
      Gallo, Michael A.
      Format: 
      Alıntı: 
      infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES