Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science)
- Security measures 23
- Computer security 16
- Computer networks 13
- Cryptography 11
- Coding theory 8
- Access control 5
- Data protection 5
- Electronic commerce 5
- Electronic funds transfers 5
- Computers 4
- Law and legislation 4
- Automation 3
- Contracts 3
- Internet 3
- Multimedia systems 3
- Blockchains (Databases) 2
- Business enterprises 2
- Combinatorial designs and configurations 2
- Data processing 2
- Database management 2
- Digital media 2
- Digital signatures 2
- Digital watermarking 2
- Image processing 2
- Mathematics 2
- Privacy, Right of 2
- Public key cryptography 2
- Public key infrastructure (Computer security) 2
- Telecommunication 2
-
1
-
2
-
3
-
4
Tom Clancy's power plays ruthless.com
Published 1998Click Here to View Status and Holdings.
Unknown -
5
RSA security's official guide to crytography
Published 2001Click Here to View Status and Holdings.
Unknown -
6
-
7
Non-repudiation in electronic commerce
Published 2001Click Here to View Status and Holdings.
Unknown -
8
-
9
Electronic payment systems for e-commerce
Published 2001Click Here to View Status and Holdings.
Unknown -
10
Cryptography and network security principles and practice
Published 1999Click Here to View Status and Holdings.
Unknown -
11
-
12
Secure XML the new syntax for signature and encryption
Published 2003Click Here to View Status and Holdings.
Unknown -
13
Protocols for authentication and key establishment
Published 2003Click Here to View Status and Holdings.
Unknown -
14
-
15
-
16
-
17
-
18
-
19
-
20
Quantum communications and cryptography
Published 2006Click Here to View Status and Holdings.
Unknown