Výsledky vyhledávání - "thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption"
-
1
Autoři: Coyne, Richard
Témata: smart city, code, thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RP Regional and area planning::RPC Urban and municipal planning and policy, 11. Sustainability, Cryptography, cities, urbanism, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, encryption, thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society
Popis souboru: image/jpeg
-
2
Přispěvatelé: Miciuła, Ireneusz
Témata: thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
Popis souboru: image/jpeg
Relation: ONIX_20250220_9780854662173_46; https://www.intechopen.com/books/1002408
-
3
Přispěvatelé: Mayer, Joceli
Témata: thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
Popis souboru: image/jpeg
Relation: ONIX_20250220_9780854669011_103; https://www.intechopen.com/books/1003370
-
4
Přispěvatelé: a další
Témata: Electronic Voting, E-voting, Internet Voting, Electronic Voting Machines, Security, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
Popis souboru: application/pdf
Relation: Lecture Notes in Computer Science; ONIX_20241021_9783031722448_27
-
5
Přispěvatelé: a další
Témata: Computer system organization, Computing methodologies, Applied computing, Human-centered computing, Security, thema EDItEUR::U Computing and Information Technology, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKM Embedded systems, thema EDItEUR::U Computing and Information Technology::UN Databases::UNC Data capture and analysis, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
Popis souboru: image/jpeg
Relation: ONIX_20241119_9783832558550_35
-
6
Přispěvatelé: a další
Témata: Electronic Voting, E-voting, Internet Voting, Electronic Voting Machines, Security, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
Popis souboru: image/jpeg
Relation: Lecture Notes in Computer Science; ONIX_20241021_9783031722448_27; https://library.oapen.org/handle/20.500.12657/93864
-
7
Autoři:
Témata: norm, optimal, thema EDItEUR::U Computing and Information Technology::UR Computer security, STM, Cryptology, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming, IT Security, Crisis, INFORMATIONSCIENCE, SCI-TECH, COMPUTERSCIENCE, Online, inspection, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, CHOICE Highly Recommended Title, thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining, vulnerabilities, malware, software, packet, Data Preparation and Mining, ITECH, Access, InfoSECURITY, defense, Privacy, deep, Security, Unauthorized, perfect
Popis souboru: image/jpeg; application/pdf
Přístupová URL adresa: https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
https://directory.doabooks.org/handle/20.500.12854/33106
https://library.oapen.org/handle/20.500.12657/41680
https://directory.doabooks.org/handle/20.500.12854/26758
https://library.oapen.org/handle/20.500.12657/40085
https://library.oapen.org/bitstream/20.500.12657/40085/1/9781138436923.pdf
https://www.taylorfrancis.com/books/9780429093791
https://library.oapen.org/handle/20.500.12657/41680
https://library.oapen.org/handle/20.500.12657/40085 -
8
Autoři:
Témata: CHOICE Highly Recommended Title, Data Preparation and Mining, IT Security, Cryptology, InfoSECURITY, SCI-TECH, COMPUTERSCIENCE, ITECH, INFORMATIONSCIENCE, STM, deep, defense, inspection, malware, norm, optimal, packet, perfect, software, vulnerabilities, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming, thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
Popis souboru: image/jpeg
Relation: ONIX_20200921_9781439830147_40; OCN: 857078800; https://library.oapen.org/handle/20.500.12657/41680; https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
Nájsť tento článok vo Web of Science