Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Electronic digital computers --- Cryptography --- Data protection --- Ordinateurs --- Cryptographie --- Protection de l'information (Informatique) --- Access control --- Accès --- Contrôle --- 681.3*E3 --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data encryption: data encryption standard DES public key cryptosystems --- Computers --- Cryptography. --- Data protection. --- Access control. --- 681.3*E3 Data encryption: data encryption standard DES public key cryptosystems --- Accès --- Contrôle --- -681.3*E3 --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer security --- cryptografie --- Computer science --- Computers - Access control
Choose an application
Computers --- Data protection --- Public key cryptography --- Access control --- -Data protection --- 681.3*D46 --- 681.3*E3 --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer security --- Computers - Access control
Listing 1 - 2 of 2 |
Sort by
|