Skip to content
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
    • Māori
Udvidet
  • Channels
  • Network Security and Cryptography :
Search for more channels:

Lignende værker: Network Security and Cryptography :

Cryptography and network security.

Quantum Computing for the Quantum Curious

International Symposium on Mathematics, Quantum Theory, and Cryptography

Basics of contemporary cryptography for IT practitioners /

Cryptoreality : A Conversation with Artur Ekert.

Gendai angō no tanjō to hatten : posuto ryōshi angō, kasō tsūka, atarashii angō /

Algebraic geometry in coding theory and cryptography /

Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.

Network security evaluation : using the NSA IEM /

Managing Cisco network security /

Network and system security /

Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis /

Decoding reality : the universe as quantum information /

Coding theory and cryptology /

Web application security is a stack : how to CYA (Cover Your Apps) completely /

Web application security is a stack : how to CYA (Cover Your Apps) completely /

Managing information security /

Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /

Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

The mathematics of secrets : cryptography from Caesar ciphers to digital encryption /

Emne: Quantum computers

Quantum, nano, micro technologies and applied researches : selected, peer reviewed papers from the 2013 2nd International Symposium on Quantum, Nano and Micro Technologies (ISQNM 2013), December 1-2, 2013, Singapore /

Quantum information III : proceedings of the third international conference, Meijo University, Japan, 7-10 March 2000 /

Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /

Quantum information /

Classical and Quantum Information Theory : an Introduction for the Telecom Scientist.

Microwave techniques in superconducting quantum computers /

Decoding reality : the universe as quantum information /

Emne: Information theory in physics

  • Emne: Computer networks
  • Emne: Cryptography.
  • Emne: Réseaux d'ordinateurs
  • Emne: Cryptographie.
  • Emne: Security measures.
  • Emne: Sécurité
  • Emne: Mesures.

Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /

Forfatter: Musa, Sarhan M.

Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /

Søgemuligheder

  • Søg Historie
  • Udvidet søgning

Find flere

  • Gennemse kataloget
  • Gennemse alfabetisk
  • Explore Channels
  • Kursusreservationer
  • Nye værker

Har du brug for hjælp?

  • Søgetips
  • Spørg en bibliotekar
  • Feedback
  • FAQ’er
Global Library, O.P. Jindal Global University. All rights reserved.