Search Results
Suggested Subjects within your search.
Suggested Subjects within your search.
- Data encryption (Computer science)
- Cryptography 1,625
- Cryptology 1,583
- Data protection 1,057
- Computer networks 993
- Data and Information Security 979
- Computer Communication Networks 899
- Management 489
- Electronic data processing 458
- IT Operations 458
- Application software 431
- Computer and Information Systems Applications 431
- Information theory 416
- Algorithms 393
- Computers and Society 324
- Computers and civilization 324
- Coding theory 294
- Coding and Information Theory 293
- Computer science 280
- Security measures 269
- Computer networks 254
- Mathematics 237
- Mobile and Network Security 218
- Data Structures and Information Theory 186
- Data structures (Computer science) 186
- Computer Engineering and Networks 183
- Computer engineering 183
- Discrete mathematics 160
- Software engineering 157
- Software Engineering 156
-
1
-
2
Understanding Bitcoin : Cryptography, Engineering and Economics.
Imprint 2014Click to View
eBook Electronic -
3
-
4
Hashing in Computer Science : Fifty Years of Slicing and Dicing.
Imprint 2010Click to View
eBook Electronic -
5
-
6
Cyber Defense and Situational Awareness
Imprint 2014Available in Springer Computer Science eBooks 2014 English/International.
Electronic eBook -
7
-
8
-
9
-
10
-
11
Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008 Villach, Austria, March 11-12, 2008 Proceedings /
Imprint 2008Available in Springer Computer Science eBooks 2008 English/International.
Electronic eBook -
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
Trusted Computing Platforms TPM2.0 in Context /
Imprint 2014Available in Springer Computer Science eBooks 2014 English/International.
Electronic eBook -
20