Suchergebnisse - thema EDItEUR::U Computing AND Information Technology::UR Computer security::URY Data encryption
-
1
Autoren: Coyne, Richard
Schlagwörter: smart city, code, thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RP Regional and area planning::RPC Urban and municipal planning and policy, 11. Sustainability, Cryptography, cities, urbanism, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, encryption, thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society
Dateibeschreibung: image/jpeg
-
2
Weitere Verfasser:
Schlagwörter: Open Access, Privacy and Data Protection, Cybersecurity, Multilateral Security, Anonymity, Computing / technology policy, Social aspects of security and privacy, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects, thema EDItEUR::U Computing and Information Technology::UX Applied computing, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security
Dateibeschreibung: image/jpeg
Relation: Lecture Notes in Computer Science; Computer Science; Computer Science (R0); ONIX_20251020T130859_9783032075741_59; https://library.oapen.org/handle/20.500.12657/107693; https://library.oapen.org/bitstream/20.500.12657/107693/1/9783032075741.pdf
-
3
Weitere Verfasser: et al.
Schlagwörter: Open Access, Computational complexity and cryptography, Robustness, Human computer interaction (HCI), Data management systems, Architectures, Systems security, Government technology policy, Law, social and behavioral sciences, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
Dateibeschreibung: image/jpeg
Relation: Lecture Notes in Computer Science; Computer Science; Computer Science (R0); ONIX_20250918T180551_9783032050366_16; https://library.oapen.org/handle/20.500.12657/106046; https://library.oapen.org/bitstream/20.500.12657/106046/1/9783032050366.pdf
-
4
Autoren:
Schlagwörter: Future Network Architecture, Co-governed Multiple Identifier Network, Cyber Security, Blockchain, Network Evolution, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UN Databases, thema EDItEUR::U Computing and Information Technology::UK Computer hardware
Dateibeschreibung: image/jpeg
Relation: ONIX_20250715T093430_9789819635962_30; https://library.oapen.org/handle/20.500.12657/104174; https://library.oapen.org/bitstream/20.500.12657/104174/1/9789819635962.pdf
-
5
Weitere Verfasser: et al.
Schlagwörter: Financial Innovation, Blockchain, Cryptocurrencie, Non-fungible Tokens, Financial Markets Volatility, FinTech, Financial Stability, Bitcoin, thema EDItEUR::K Economics, Finance, Business and Management::KC Economics, Business and Management::KF Finance and accounting::KFF Finance and the finance industry, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UN Databases
Dateibeschreibung: image/jpeg
Relation: ONIX_20250613T105552_9789819668397_42; https://library.oapen.org/handle/20.500.12657/103599; https://library.oapen.org/bitstream/20.500.12657/103599/1/9789819668397.pdf
-
6
Weitere Verfasser:
Schlagwörter: Open Access, Blockchain, Governance mechanisms, Organizational design, DAO, Decision making, thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJU Organizational theory and behaviour, Business and Management::KJ Business and Management::KJQ Business mathematics and systems, thema EDItEUR::U Computing and Information Technology::UF Business applications, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UN Databases, Business and Management::KJ Business and Management::KJR Corporate governance: role and responsibilities of boards and directors, Business and Management::KC Economics::KCA Economic theory and philosophy
Dateibeschreibung: image/jpeg
Relation: Springer Proceedings in Business and Economics; Business and Management; Business and Management (R0); ONIX_20251128T131701_9783032032737_18; https://library.oapen.org/handle/20.500.12657/108658; https://library.oapen.org/bitstream/20.500.12657/108658/1/9783032032737.pdf
-
7
Weitere Verfasser:
Schlagwörter: Data encryption, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
Dateibeschreibung: image/jpeg
Relation: ONIX_20250617T171318_9780854667000_33; https://www.intechopen.com/books/1003439
-
8
Weitere Verfasser: Mayer, Joceli
Schlagwörter: thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
Dateibeschreibung: image/jpeg
Relation: ONIX_20250220_9780854669011_103; https://www.intechopen.com/books/1003370
-
9
Weitere Verfasser: Miciuła, Ireneusz
Schlagwörter: thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
Dateibeschreibung: image/jpeg
Relation: ONIX_20250220_9780854662173_46; https://www.intechopen.com/books/1002408
-
10
Weitere Verfasser: et al.
Schlagwörter: Computer system organization, Computing methodologies, Applied computing, Human-centered computing, Security, thema EDItEUR::U Computing and Information Technology, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKM Embedded systems, thema EDItEUR::U Computing and Information Technology::UN Databases::UNC Data capture and analysis, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
Dateibeschreibung: image/jpeg
Relation: ONIX_20241119_9783832558550_35
-
11
Weitere Verfasser: et al.
Schlagwörter: Electronic Voting, E-voting, Internet Voting, Electronic Voting Machines, Security, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
Dateibeschreibung: application/pdf
Relation: Lecture Notes in Computer Science; ONIX_20241021_9783031722448_27
-
12
Weitere Verfasser: et al.
Schlagwörter: Electronic Voting, E-voting, Internet Voting, Electronic Voting Machines, Security, thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GP Research and information: general::GPJ Coding theory and cryptology, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications::UTN Network security, thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware
Dateibeschreibung: image/jpeg
Relation: Lecture Notes in Computer Science; ONIX_20241021_9783031722448_27; https://library.oapen.org/handle/20.500.12657/93864
-
13
Autoren:
Schlagwörter: norm, optimal, thema EDItEUR::U Computing and Information Technology::UR Computer security, STM, Cryptology, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming, IT Security, Crisis, INFORMATIONSCIENCE, SCI-TECH, COMPUTERSCIENCE, Online, inspection, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption, CHOICE Highly Recommended Title, thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining, vulnerabilities, malware, software, packet, Data Preparation and Mining, ITECH, Access, InfoSECURITY, defense, Privacy, deep, Security, Unauthorized, perfect
Dateibeschreibung: image/jpeg; application/pdf
Zugangs-URL: https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
https://directory.doabooks.org/handle/20.500.12854/33106
https://library.oapen.org/handle/20.500.12657/41680
https://directory.doabooks.org/handle/20.500.12854/26758
https://library.oapen.org/handle/20.500.12657/40085
https://library.oapen.org/bitstream/20.500.12657/40085/1/9781138436923.pdf
https://www.taylorfrancis.com/books/9780429093791
https://library.oapen.org/handle/20.500.12657/41680
https://library.oapen.org/handle/20.500.12657/40085 -
14
Autoren:
Schlagwörter: CHOICE Highly Recommended Title, Data Preparation and Mining, IT Security, Cryptology, InfoSECURITY, SCI-TECH, COMPUTERSCIENCE, ITECH, INFORMATIONSCIENCE, STM, deep, defense, inspection, malware, norm, optimal, packet, perfect, software, vulnerabilities, thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMK Games development and programming, thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining, thema EDItEUR::U Computing and Information Technology::UR Computer security, thema EDItEUR::U Computing and Information Technology::UR Computer security::URY Data encryption
Dateibeschreibung: image/jpeg
Relation: ONIX_20200921_9781439830147_40; OCN: 857078800; https://library.oapen.org/handle/20.500.12657/41680; https://library.oapen.org/bitstream/20.500.12657/41680/1/9781439830147.pdf
Nájsť tento článok vo Web of Science