by
Patch, Kimberly.
Format:
Electronic Resources
Excerpt:
Data encryption (Computer science).
by
Bayer, Chad.
Format:
Electronic Resources
Excerpt:
Data encryption (Computer science) -- Examinations -- Study guides.
View Other Search Results
by
Niles, Kitty, author.
Format:
Electronic Resources
Excerpt:
Data encryption (Computer science)
by
Winder, Steve.
Format:
Electronic Resources
Excerpt:
; Radio equipment; Microwave communication; Information privacy and encryption; Multiplexing; Speech
by
Gallo, Michael A.
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Publisher description http://www.loc.gov/catdir/description/els031/2002282851.html
Table of contents http://www.loc.gov/catdir/toc/els031/2002282851.html
Publisher description http://www.loc.gov/catdir/description/els031/2002282851.html
Table of contents http://www.loc.gov/catdir/toc/els031/2002282851.html
Format:
Electronic Resources
Excerpt:
infrastructure standards; the results of the new advanced encryption standard (AES) that will replace DES
by
Gupta, Rashi.
Format:
Electronic Resources
Excerpt:
Network Resources -- Configuration Management -- Data Encryption -- Public Key Infrastructure -- Summary
by
Wayner, Peter, 1964-
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Publisher description http://www.loc.gov/catdir/description/els031/2001099790.html
Table of contents http://www.loc.gov/catdir/toc/els031/2001099790.html
Publisher description http://www.loc.gov/catdir/description/els031/2001099790.html
Table of contents http://www.loc.gov/catdir/toc/els031/2001099790.html
Format:
Electronic Resources
Excerpt:
different techniques to hide information. These include encryption, making data incomprehensible
by
Stefanek, George L.
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Publisher description http://www.loc.gov/catdir/description/els031/2002016635.html
Table of contents http://www.loc.gov/catdir/toc/els031/2002016635.html
Publisher description http://www.loc.gov/catdir/description/els031/2002016635.html
Table of contents http://www.loc.gov/catdir/toc/els031/2002016635.html
Format:
Electronic Resources
Excerpt:
And Verification -- Ch. 14 Data Encryption -- Ch. 15 Configuration Management -- Ch. 16 Monitoring The
by
Vine, Michael A.
Format:
Electronic Resources
Excerpt:
-- Chapter Program: Cryptogram -- Introduction to Encryption -- Building the Cryptogram Program -- Summary
by
Vine, Michael A.
Format:
Electronic Resources
Excerpt:
Data File -- Writing Sequential Data to a File -- Reading Data from a Sequential File -- Closing a
by
Redbooks, IBM.
Format:
Electronic Resources
Excerpt:
algorithm relationship -- 2.3.1 Using encryption to ensure data privacy -- 2.3.2 Using signatures to ensure
by
Varghese, Mathew.
Format:
Electronic Resources
Excerpt:
Firewalls -- Firewall Considerations -- IDSs -- IDS Models -- Selecting an IDS -- Analyzing IDSs -- Data
Limit Search Results
Narrowed by: