Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science)
- Security measures 16
- Cryptography 15
- Computer networks 11
- Computer security 11
- Computer Security 6
- Blockchains (Databases) 4
- Electronic commerce 4
- Mathematics 4
- Electronic funds transfers 3
- Access control 2
- Algorithms 2
- Bitcoin 2
- Computer science 2
- Computers 2
- Database management 2
- Electronic Data Processing 2
- Image processing 2
- Public key cryptography 2
- Public key infrastructure (Computer security) 2
- Telecommunication 2
- Algebra 1
- Certification 1
- Ciphers 1
- Civil rights 1
- Coding theory 1
- Combinatorial analysis 1
- Computer algorithms 1
- Computer crimes 1
- Computer file sharing 1
-
1
Implementing SSH : strategies for optimizing the Secure Shell
Published 2004Full text (MFA users only)
Electronic eBook -
2
-
3
ExamWise for CIW security professional : exam 1D0-470
Published 2003Full text (MFA users only)
Electronic eBook -
4
Securing information and communications systems : principles, technologies, and applications
Published 2008Full text (MFA users only)
Electronic eBook -
5
Introduction to identity-based encryption
Published 2008Full text (MFA users only)
Electronic eBook -
6
Security : secrets, intruders and ID tags.
Published 2003Full text (MFA users only)
Electronic eBook -
7
Modelling cyber security : approaches, methodology, strategies
Published 2009Full text (MFA users only)
Electronic Conference Proceeding eBook -
8
-
9
Hashing in computer science : fifty years of slicing and dicing
Published 2010Full text (MFA users only)
Electronic eBook -
10
Implementing SSL/TLS using cryptography and PKI
Published 2011Full text (MFA users only)
Electronic eBook -
11
Information security, coding theory and related combinatorics : information coding and combinatorics
Published 2011Full text (MFA users only)
Electronic Conference Proceeding eBook -
12
Quantum cryptography and computing : theory and implementation
Published 2010Full text (MFA users only)
Electronic eBook -
13
Visual cryptography and secret image sharing
Published 2012Full text (MFA users only)
Electronic eBook -
14
Burdens of proof : cryptographic culture and evidence law in the age of electronic documents
Published 2012Full text (MFA users only)
Electronic eBook -
15
-
16
Radio frequency identification system security : RFIDsec'12 Asia Workshop proceedings
Published 2012Full text (MFA users only)
Electronic Conference Proceeding eBook -
17
-
18
Surveillance or security? : the risks posed by new wiretapping technologies
Published 2010Full text (MFA users only)
Electronic eBook -
19
Cryptography : protocols, design, and applications
Published 2012Full text (MFA users only)
Electronic eBook -
20