Search ResultsElektronik Kaynaklar
Arama Sonuçlarını Sınırlandır
Yazar
Materyal Türü
Konu
Kütüphane
75 sonuç bulundu Arama sonuçlarına abone ol
000000000000000000000000000000000000000000000000000000000000000000000000000DEFAULTTR
Yazdır
Liste seç
Bunu varsayılan liste yap.
Öğeler başarıyla eklendi
    Öğeler eklenirken hata oldu. Lütfen tekrar deneyiniz.
      by 
      Loshin, Pete.
      Format: 
      Alıntı: 
      Simple steps to data encryption a practical guide to secure computing / Loshin, Pete.
      by 
      Cusick, Thomas W., author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Katzenbeisser, Stefan, author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Laud, Peeter, editor.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Lek, Kamol.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Joye, Marc, 1969-
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Martin, Luther.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      ProQuest (Firm)
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Su, Qingtang, author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Curley, Robert.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Cao, Zhenfu.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Lu, Zhe-Ming, author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Tokareva, Natalia, author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Schaathun, Hans Georg.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Franco, Pedro, author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Sakiyama, Kazuo, 1971- author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Cimato, Stelvio.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Blanchette, Jean-François.
      Format: 
      Alıntı: 
      Data encryption (Computer science) -- Law and legislation.
      by 
      McAndrew, Alasdair, author.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Konheim, Alan G., 1934-
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Zhang, Rui.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Landau, Susan Eva.
      Format: 
      Alıntı: 
      Data encryption (Computer science) -- Government policy -- United States.
      by 
      Diffie, Whitfield.
      Format: 
      Alıntı: 
      Data encryption (Computer science) -- Law and legislation -- United States.
      by 
      Kinney, Steven.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Axelrod, C. Warren.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      ProQuest (Firm)
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      El Mrabet, Nadia, editor.
      Format: 
      Alıntı: 
      Data encryption (Computer science) -- Mathematics.
      by 
      Horodecki, Ryszard.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Xu, Zhengquan, 1962-
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      NATO Advanced Research Workshop on Operational Network Intelligence: Today and Tomorrow (2009 : Venice, Italy)
      Format: 
      Alıntı: 
      Data encryption (Computer science) -- Congresses.
      by 
      Furnell, Steven, 1970-
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Dwivedi, Himanshu.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Bayer, Chad M.
      Format: 
      Alıntı: 
      Data encryption (Computer science) -- Examinations -- Study guides.
      by 
      Borges de Oliveira, Fábio. author.
      Format: 
      Alıntı: 
      Data encryption (Computer science).
      by 
      Nematollahi, Mohammad Ali. author.
      Format: 
      Alıntı: 
      Data encryption (Computer science).
      by 
      Zhu, Liehuang. author.
      Format: 
      Alıntı: 
      Data encryption (Computer science).
      by 
      Cusick, Thomas W., 1943-
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Sencar, Husrev T.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Forte, Domenic. editor.
      Format: 
      Alıntı: 
      Data encryption (Computer science).
      by 
      Mishra, Prabhat. editor.
      Format: 
      Alıntı: 
      Data encryption (Computer science).
      by 
      Liu, Dale.
      Format: 
      Alıntı: 
      Data encryption (Computer science)
      by 
      Grzenda, Maciej. editor.
      Format: 
      Alıntı: 
      networks, photonic data transport networks, security policies, credentials management, data encryption for
      Format: 
      Alıntı: 
      : Administrative Roles -- 10: Auditing Triggers -- 11: Data Encryption -- 12: Securing Reporting/Analysis Services.
      by 
      Winder, Steve.
      Format: 
      Alıntı: 
      ; Radio equipment; Microwave communication; Information privacy and encryption; Multiplexing; Speech
      by 
      Langenberg, Brandon Wade, author.
      Format: 
      Alıntı: 
      interest. In the area of cryptography, some encryption schemes (such as RSA) are already deemed broken by
      by 
      Kim, Daehee. author.
      Format: 
      Alıntı: 
      displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small
      by 
      Krishnamurthy Madwachar, Mohan.
      Format: 
      Alıntı: 
      following three-part structure in mind: locking down the network, securing data passing across the network
      by 
      Tsoutsos, Nektarios Georgios, author.
      Format: 
      Alıntı: 
      directly in encrypted form, using the power of additive homomorphic encryption. Our objective is to support
      by 
      Dey, Nilanjan. editor.
      Format: 
      Alıntı: 
      offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption
      by 
      Thames, Lane. editor.
      Format: 
      Alıntı: 
      Security in Industry 4.0 -- Big Data Security Intelligence for Healthcare Industry 4.0 -- Decentralized
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Alıntı: 
      Preservation in Cloud Computing with Double Encryption Method -- A Machine learning based approach for Opinion
      by 
      Wayner, Peter, 1964-
      Format: 
      Alıntı: 
      . These methods include encryption, compression, data embedding and watermarking, data mimicry, and
      by 
      Chandra, Praphul.
      Format: 
      Alıntı: 
      desirable feature--instead, it's a necessity to protect essential personal and business data from hackers
      by 
      Vacca, John R.
      Format: 
      Alıntı: 
      deploying firewalls, data encryption and decryption and other countermeasures.
      by 
      Reid, Fiach.
      Format: 
      Alıntı: 
      -- Protecting data : encryption -- Controlling user access : authentication and authorization -- Programming for
      by 
      Gallo, Michael A.
      Format: 
      Alıntı: 
      infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES
      by 
      Wayner, Peter, 1964-
      Format: 
      Alıntı: 
      different techniques to hide information. These include encryption, making data incomprehensible
      by 
      Stefanek, George L.
      Format: 
      Alıntı: 
      And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
      by 
      Crowley, Patrick, 1974-
      Format: 
      Alıntı: 
      -specific processors, such as classification and encryption engines, to more general-purpose packet or communications
      by 
      Edmundson, Anne Marissa, author.
      Format: 
      Alıntı: 
      . Existing protocol encryption such as TLS is not sufficient, since a wide range of data, from DNS lookups to
      by 
      Agrawal, Dharma Prakash. author.
      Format: 
      Alıntı: 
      Connectivity for Random Deployment -- Chapter-10: Medium Access and Routing -- Chapter-11: Broadcasting, Data
      by 
      Vacca, John R.
      Format: 
      Alıntı: 
      encryption / Satellite encryption / Public key infrastructure / Instant-messaging security / NET privacy
      by 
      Kanclirz, Jan.
      Format: 
      Alıntı: 
      Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set
      by 
      International Meeting on Applied Physics (1st : 2003 : Badajoz, Spain)
      Format: 
      Alıntı: 
      Workers - Ethical Issues. Chaotic Data Encryption for Optical Communications.
      by 
      Burnett, Mark (Mark M.)
      Format: 
      Alıntı: 
      ; ; Introduction; ; Applying XML Encryption; ; Encrypting XML Data; ; Applying XML Digital Signatures; ; Signing
      by 
      Bidgoli, Hossein.
      Format: 
      Alıntı: 
      -Oriented Data Model -- Data versus Information -- Data Warehousing and Data Marts -- Database Administration
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Alıntı: 
      Environment -- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless
      by 
      Modi, Nilesh. editor.
      Format: 
      Alıntı: 
      . EncryScation: A secure Approach for Data Security Using Encryption and Obfuscation Techniques for IaaS and DaaS
      by 
      Satapathy, Suresh Chandra. editor.
      Format: 
      Alıntı: 
      Anonymization: Hybridizing Data Restructure with Feature Set Partitioning for Privacy Preserving in Supervised
      by 
      Cummins, Fred.
      Format: 
      Alıntı: 
      -- Agile enterprise requirements -- Logical data model -- Data exchange -- Business intelligence services
      by 
      Su, Wencong.
      Format: 
      Alıntı: 
      - Emerging data encryption methods applicable to Energy Internet -- 8.1 Introduction -- 8.2 Importance of
      by 
      Celko, Joe.
      Format: 
      Alıntı: 
      Encryption via Tables -- 8.2 Check Digits via Tables -- 8.2.1 Check Digits Defi ned -- 8.2.2 Error Detection