Salta al contenuto
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
    • Māori
Avanzata
  • Channels
  • Network Security and Cryptography :
Certca su più sezioni:

Documenti analoghi: Network Security and Cryptography :

Cryptography and network security.

Quantum Computing for the Quantum Curious

International Symposium on Mathematics, Quantum Theory, and Cryptography

Basics of contemporary cryptography for IT practitioners /

Cryptoreality : A Conversation with Artur Ekert.

Gendai angō no tanjō to hatten : posuto ryōshi angō, kasō tsūka, atarashii angō /

Algebraic geometry in coding theory and cryptography /

Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.

Network security evaluation : using the NSA IEM /

Managing Cisco network security /

Network and system security /

Packet analysis with Wireshark : leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing an improved protocol analysis /

Decoding reality : the universe as quantum information /

Coding theory and cryptology /

Web application security is a stack : how to CYA (Cover Your Apps) completely /

Web application security is a stack : how to CYA (Cover Your Apps) completely /

Managing information security /

Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /

Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography

The mathematics of secrets : cryptography from Caesar ciphers to digital encryption /

Soggetto: Quantum computers

Quantum, nano, micro technologies and applied researches : selected, peer reviewed papers from the 2013 2nd International Symposium on Quantum, Nano and Micro Technologies (ISQNM 2013), December 1-2, 2013, Singapore /

Quantum information III : proceedings of the third international conference, Meijo University, Japan, 7-10 March 2000 /

Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /

Quantum information /

Classical and Quantum Information Theory : an Introduction for the Telecom Scientist.

Microwave techniques in superconducting quantum computers /

Decoding reality : the universe as quantum information /

Soggetto: Information theory in physics

  • Soggetto: Computer networks
  • Soggetto: Cryptography.
  • Soggetto: Réseaux d'ordinateurs
  • Soggetto: Cryptographie.
  • Soggetto: Security measures.
  • Soggetto: Sécurité
  • Soggetto: Mesures.

Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /

Autore: Musa, Sarhan M.

Network Security and Cryptography : A Self-Teaching Introduction, Second Edition /

Opzioni di ricerca

  • Ultime ricerche
  • Ricerca avanzata

Cerca

  • Scorri il catalogo
  • Scorri in ordine alfabetico
  • Esplora selezioni
  • Materiali riservati (per i corsi)
  • Nuovi documenti

Serve aiuto?

  • Suggerimenti per la ricerca
  • Chiedi al bibliotecario
  • Feedback
  • FAQ
Global Library, O.P. Jindal Global University. All rights reserved.