Search Results
Suggested Subjects within your search.
Suggested Subjects within your search.
- Cryptology
- Data encryption (Computer science) 1,583
- Cryptography 1,581
- Data protection 1,040
- Computer networks 993
- Data and Information Security 979
- Computer Communication Networks 899
- Management 489
- Electronic data processing 458
- IT Operations 458
- Application software 431
- Computer and Information Systems Applications 431
- Information theory 416
- Algorithms 392
- Computers and Society 324
- Computers and civilization 324
- Coding and Information Theory 293
- Coding theory 293
- Computer science 279
- Mathematics 233
- Computer networks 218
- Mobile and Network Security 218
- Security measures 218
- Data Structures and Information Theory 186
- Data structures (Computer science) 186
- Computer Engineering and Networks 183
- Computer engineering 183
- Discrete mathematics 160
- Software Engineering 156
- Software engineering 156
-
1
-
2
-
3
Cyber Defense and Situational Awareness
Imprint 2014Available in Springer Computer Science eBooks 2014 English/International.
Electronic eBook -
4
-
5
-
6
-
7
-
8
Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings /
Imprint 2008Available in Springer Computer Science eBooks 2008 English/International.
Electronic eBook -
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
Trusted Computing Platforms TPM2.0 in Context /
Imprint 2014Available in Springer Computer Science eBooks 2014 English/International.
Electronic eBook -
17
-
18
Protecting Oracle Database 12c
Imprint 2014Available in Springer Professional and Applied Computing eBooks 2014 English/International.
Electronic eBook -
19
-
20
Practical Hadoop Security
Imprint 2014Available in Springer Professional and Applied Computing eBooks 2014 English/International.
Electronic eBook