cryptography and information security online kopen

Ben je op zoek naar cryptography and information security? Bekijk onze boeken selectie en zie direct bij welke webshop je cryptography and information security online kan kopen. Ga je voor een ebook of paperback van cryptography and information security. Zoek ook naar accesoires voor cryptography and information security. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je cryptography and information security met korting of in de aanbieding. Alles voor veel leesplezier!

Information Security and Privacy

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held;

Vergelijkbare producten zoals Information Security and Privacy

Cryptography and Information Security in the Balkans

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the;

Vergelijkbare producten zoals Cryptography and Information Security in the Balkans

Cryptography and Information Security

background required to understand the principles of cryptography and information security, the text explains all the relevant theorems, such as;

Vergelijkbare producten zoals Cryptography and Information Security

Cryptography Research Perspectives

Cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory;

Vergelijkbare producten zoals Cryptography Research Perspectives

Cryptography and Information Security in the Balkans

This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans;

Vergelijkbare producten zoals Cryptography and Information Security in the Balkans

Information Security and Cryptology

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and;

Vergelijkbare producten zoals Information Security and Cryptology

Modern Cryptography: Applied Mathematics For Encryption And

security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers;

Vergelijkbare producten zoals Modern Cryptography: Applied Mathematics For Encryption And

Information Security and Privacy

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held;

Vergelijkbare producten zoals Information Security and Privacy

Information Security and Cryptology - ICISC 2015

field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block;

Vergelijkbare producten zoals Information Security and Cryptology - ICISC 2015

Physical-Layer Security and Quantum Key Distribution

exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection;

Vergelijkbare producten zoals Physical-Layer Security and Quantum Key Distribution

Physical-Layer Security and Quantum Key Distribution

exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection;

Vergelijkbare producten zoals Physical-Layer Security and Quantum Key Distribution

Quantum Cryptography and Secret-Key Distillation

wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter;

Vergelijkbare producten zoals Quantum Cryptography and Secret-Key Distillation

Quantum Cryptography and Secret-Key Distillation

wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter;

Vergelijkbare producten zoals Quantum Cryptography and Secret-Key Distillation

Cyber Security Cryptography and Machine Learning

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held;

Vergelijkbare producten zoals Cyber Security Cryptography and Machine Learning

Cryptography, Information Theory, and Error- Correction - A Handbook for the 21st Century, 2nd Edition

CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION A rich examination of the technologies supporting secure digital information;

Vergelijkbare producten zoals Cryptography, Information Theory, and Error- Correction - A Handbook for the 21st Century, 2nd Edition

Information Security Practice and Experience

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC;

Vergelijkbare producten zoals Information Security Practice and Experience

Broadband Quantum Cryptography

the quantum key distribution process, and maintaining security at both the theoretical and practical level. Overall, quantum cryptography has;

Vergelijkbare producten zoals Broadband Quantum Cryptography

Information Security

For a introductory course in information security covering principles and practices. This text has been developed to cover the 10 domains;

Vergelijkbare producten zoals Information Security

Information Security

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security;

Vergelijkbare producten zoals Information Security

A Classical Introduction to Cryptography: Applications for Communications Security

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication;

Vergelijkbare producten zoals A Classical Introduction to Cryptography: Applications for Communications Security

Device-Independent Quantum Information Processing

, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the communication;

Vergelijkbare producten zoals Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing

, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the communication;

Vergelijkbare producten zoals Device-Independent Quantum Information Processing

Cryptography

Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer;

Vergelijkbare producten zoals Cryptography

Information Security of Intelligent Vehicles Communication

collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology;

Vergelijkbare producten zoals Information Security of Intelligent Vehicles Communication

Information Security of Intelligent Vehicles Communication

collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology;

Vergelijkbare producten zoals Information Security of Intelligent Vehicles Communication

Information Systems Security

This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad;

Vergelijkbare producten zoals Information Systems Security

Advances in Information and Computer Security

cryptography, privacy, pairing-based cryptography, and machine learning. * The conference was held virtually due to the COVID-19 pandemic.;

Vergelijkbare producten zoals Advances in Information and Computer Security

Einde inhoud

Geen pagina's meer om te laden'