Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science)
- Computer security 785
- Security measures 281
- Computer networks 255
- Data protection 128
- Cryptography 78
- Computers 74
- Access control 73
- Computer science 72
- Standards 40
- Application software 32
- Computers and civilization 31
- Internet 31
- Management information systems 28
- Coding theory 24
- Mathematics 24
- Algorithms 23
- Public key infrastructure (Computer security) 23
- Public key cryptography 22
- Software engineering 22
- Privacy, Right of 18
- User-centered system design 15
- Computer organization 13
- Artificial intelligence 12
- Cloud computing 11
- Computer crimes 11
- Law and legislation 11
- Data structures (Computer science) 10
- Electronic commerce 10
- Computer software 9
-
1
Simple steps to data encryption : a practical guide to secure computing /
Published 2013Subjects: Full Text (via Skillsoft)
Electronic eBook -
2
Simple steps to data encryption : a practical guide to secure computing /
Published 2013Subjects: Full Text (via O'Reilly/Safari)
Electronic eBook -
3
Crafting the InfoSec playbook /
Published 2015Subjects: “…Computer security.…”
Full Text (via O'Reilly/Safari)
eBook -
4
Security standardisation research : second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
Published 2015Subjects: “…Computer security Standards Congresses.…”
Full Text (via Springer)
Conference Proceeding eBook -
5
Serious cryptography : a practical introduction to modern encryption /
Published 2018Subjects: Full Text (via Skillsoft)
Electronic eBook -
6
Modelling cyber security : approaches, methodology, strategies /
Published 2009Subjects: “…Computer security Congresses.…”
Full Text (via ProQuest)
Electronic Conference Proceeding eBook -
7
The InfoSec handbook : an introduction to information security /
Published 2014Subjects: Full Text (via Skillsoft)
Electronic eBook -
8
The InfoSec handbook : an introduction to information security /
Published 2014Subjects: Full Text (via O'Reilly/Safari)
eBook -
9
Introducción al cifrado de datos /
Published 2015Subjects: Full Text (via Digitalia Hispanica)
Electronic eBook -
10
The unbreakable one-time pad cipher.
Published 2022Subjects: “…Computer security.…”
Streaming Video (via O'Reilly/Safari)
Video -
11
Securing information and communications systems : principles, technologies, and applications /
Published 2008Subjects: “…Computer security.…”
Full Text (via ProQuest)
eBook -
12
Writing secure code : practical strategies and proven techniques for building secure applications in a networked world /
Published 2003Subjects: “…Computer security.…”
Full Text (via O'Reilly/Safari)
eBook -
13
Brute force cracking the data encryption standard /
Published 2005Subjects: “…Computer security.…”
Full Text (via Springer)
Electronic eBook -
14
Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine /
Published 2014Subjects: “…Computer security.…”
Full Text (via O'Reilly/Safari)
eBook -
15
Simple steps to data encryption : a practical guide to secure computing /
Published 2013Subjects: Full Text (via ScienceDirect)
eBook -
16
The digital big bang the hard stuff, the soft stuff, and the future of cybersecurity /
Published 2019Subjects: “…Computer security.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
17
Cryptographic and Information Security Approaches for Images and Videos /
Published 2018Subjects: “…Computer security.…”
Full Text (via Taylor & Francis)
Electronic eBook -
18
Secrets and lies : digital security in a networked world /
Published 2015Subjects: “…Computer security.…”
Full Text (via Skillsoft)
Electronic eBook -
19
A practical guide to TPM 2.0 : using the new Trusted Platform Module in the new age of security /
Published 2015Subjects: “…Computer security.…”
Full Text (via Skillsoft)
Electronic eBook -
20
Selected areas in cryptography : 9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002 : revised papers /
Published 2003Subjects: “…Computer security Congresses.…”
Full Text (via Springer)
Conference Proceeding eBook