Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.
Criminal law -- Europe. --- Criminal procedure -- Europe. --- Criminal procedure. --- Privacy, Right of -- Europe. --- Privacy, Right of --- Identification --- Computer security --- Computer network resources --- Law, Politics & Government --- Commerce --- Business & Economics --- Commerce - General --- Human Rights --- Data encryption (Computer science) --- Privacy. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Business. --- Information technology. --- Business --- Data encryption (Computer science). --- Computers. --- Law and legislation. --- Business and Management. --- IT in Business. --- Information Systems Applications (incl. Internet). --- Legal Aspects of Computing. --- Information Systems and Communication Service. --- Data Encryption. --- Data processing. --- Social psychology --- Secrecy --- Solitude --- Cryptography --- Computers --- Information systems. --- Cryptology. --- Cyberspace --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Law and legislation --- Business—Data processing. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators
Choose an application
This book constitutes the joint thoroughly refereed post-proceedings of The Modeling Social Media Workshop, MSM 2010 held in Toronto, Canada in June 2010 and the International Workshop on Mining Ubiquitous and Social Environments, MUSE 2010, held in Barcelona, Spain in September 2010. The eight revised full papers included were carefully reviewed and selected after two rounds of reviewing and revision. The papers address various aspects of the analysis and engineering of socio-computational systems in which social, ubiquitous and computational processes are interdependent and tightly interwoven.
Social media --- Ubiquitous computing --- Engineering & Applied Sciences --- Sociology & Social History --- Mechanical Engineering --- Social Sciences --- Computer Science --- Mechanical Engineering - General --- Social Change --- Information Technology --- Artificial Intelligence --- User-generated media --- Computer science. --- Computer communication systems. --- User interfaces (Computer systems). --- Artificial intelligence. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- User Interfaces and Human Computer Interaction. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Legal Aspects of Computing. --- Computers and Society. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Computers --- Artificial Intelligence. --- Law and legislation --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference, EGOV 2011, held in Delft, The Netherlands, in August/September 2011. The 38 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on foundations, acceptance and diffusion, governance, openess and institutions, architecture, security and interoperability, transformation, values and change.
Internet in public administration --- Public administration --- Electronic government information --- Engineering & Applied Sciences --- Government - General --- Law, Politics & Government --- Computer Science --- Political Institutions & Public Administration - General --- Technological innovations --- Management --- Electronic government publications --- Government information --- Administration, Public --- Delivery of government services --- Government services, Delivery of --- Public management --- Public sector management --- Digital government --- E-government --- Electronic government --- Online government --- Computer network resources --- Computer science. --- Computer communication systems. --- User interfaces (Computer systems). --- Application software. --- Computers and civilization. --- Computers. --- Law and legislation. --- Management information systems. --- Computer Science. --- Computers and Society. --- Management of Computing and Information Systems. --- Legal Aspects of Computing. --- Computer Communication Networks. --- User Interfaces and Human Computer Interaction. --- Computer Appl. in Administrative Data Processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Information Systems. --- Computers --- Information systems. --- Law and legislation
Choose an application
This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 14 papers in this volume describe the various applications of this technology and cover a wide range of topics including law enforcement, disaster recovery, accounting frauds, homeland security, and information warfare.
Engineering & Applied Sciences --- Computer Science --- Computer crimes --- Forensic sciences --- Computer security --- Criminalistics --- Forensic science --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer communication systems. --- Image processing. --- Computers and civilization. --- Computers. --- Law and legislation. --- Management information systems. --- Bioinformatics. --- Computer Science. --- Legal Aspects of Computing. --- Management of Computing and Information Systems. --- Computers and Society. --- Image Processing and Computer Vision. --- Computer Communication Networks. --- Bio-informatics --- Biological informatics --- Biology --- Information science --- Computational biology --- Systems biology --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Data processing --- Communication systems --- Distributed processing --- Criminal investigation --- Crime --- Privacy, Right of --- Computers --- Information Systems. --- Computer vision. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Law and legislation --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment
Choose an application
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011. The 8 revised full papers and the 5 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis; intelligence analysis and knowledge discovery; information access and security; and infectious disease informatics.
Engineering & Applied Sciences --- Computer Science --- Expert systems (Computer science) --- Data mining --- Computer security --- Electronic surveillance --- National security --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Knowledge-based systems (Computer science) --- Systems, Expert (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data mining. --- Computers and civilization. --- Computers. --- Law and legislation. --- Management information systems. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Data Mining and Knowledge Discovery. --- Computer Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Database searching --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Distributed processing --- Remote sensing --- Data protection --- Security systems --- Hacking --- Artificial intelligence --- Soft computing --- Information Systems. --- Law and legislation --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This volume examines the basic layers of the standard-based creation and usage of legislation. In particular, it addresses the identification of legislative documents, their structure, the basic metadata and legislative changes. Since mature technologies and established practices are already in place for these layers, a standard-based approach is a necessary aspect of the up-to-date management of legislative resources. Starting out with an overview of the context for the use of XML standards in legislation, the book next examines the rationale of standard-based management of legislative documents. It goes on to address such issues as naming, the Akoma-Ntoso document model, the contribution of standard-based document management to handling legislative dynamics, meta-standards and interchange standards. The volume concludes with a discussion of semantic resources and a review on systems and projects.
Law -- Data processing. --- Semantic Web. --- XML (Document markup language). --- Legislation --- Legal documents --- Information storage and retrieval systems --- XML (Document markup language) --- Semantic Web --- Text processing (Computer science) --- Engineering & Applied Sciences --- Law, Politics & Government --- Computer Science --- Law, General & Comparative --- Data processing --- Law --- Technological innovations. --- Documents --- Documents, Legal --- Extendible Markup Language (Document markup language) --- eXtensible Markup Language (Document markup language) --- Law. --- Computer graphics. --- Computers. --- Law and legislation. --- Mass media. --- Media Law. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Legal Aspects of Computing. --- Authentication --- Commercial documents --- Legal instruments --- Legalization --- Semantic integration (Computer systems) --- Semantic networks (Information theory) --- World Wide Web --- Microformats --- Document markup languages --- Mass media --- Computer vision. --- Computers --- IT Law, Media Law, Intellectual Property. --- Cyberspace --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Law and legislation --- Optical data processing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Mass communication --- Media, Mass --- Media, The --- Communication --- Optical equipment
Choose an application
The aim of this book is to analyze four dimensions of innovating government and the use of new technologies: legal, ethical, policy and technological dimensions. By joining authors from a diversity of backgrounds (law, ethics, public administration, political science, sociology, communications science, information science, and computer science) in one book, readers (academics, policy makers, legislators and others) are confronted with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity management, that are central to today’s evolution of new modes of modern government.
Public administration -- Data processing. --- Public administration -- Technological innovations. --- Law, Politics & Government --- Law, General & Comparative --- Comparative government. --- Political science. --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Comparative political systems --- Comparative politics --- Government, Comparative --- Political systems, Comparative --- Law. --- Computers. --- Law and legislation. --- International law. --- Intellectual property --- Public administration. --- International IT and Media Law, Intellectual Property Law. --- Legal Aspects of Computing. --- Public Administration. --- Administration, Public --- Delivery of government services --- Government services, Delivery of --- Public management --- Public sector management --- Political science --- Administrative law --- Decentralization in government --- Local government --- Public officers --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Intangible property --- Law of nations --- Nations, Law of --- Public international law --- Law --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Law and legislation --- Social sciences --- State, The --- Mass media --- Computers --- IT Law, Media Law, Intellectual Property. --- Mass media. --- Mass communication --- Media, Mass --- Media, The --- Communication
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.
Computer crimes --- Telecommunication systems --- Electrical & Computer Engineering --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Telecommunications --- Investigation --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Forensic sciences --- Criminalistics --- Forensic science --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Pattern recognition. --- Computers and civilization. --- Computers. --- Law and legislation. --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Legal Aspects of Computing. --- Computers and Society. --- Operating Systems. --- Pattern Recognition. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Criminal investigation --- Information Systems. --- Optical pattern recognition. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Law and legislation
Choose an application
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was “Remodelling the Attacker” with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn’t the attacker’s capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
Computer security --- Data encryption (Computer science) --- Computer networks --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Computers --- Cryptography --- Access control --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers. --- Law and legislation. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Operating Systems. --- Information Systems Applications (incl. Internet). --- Legal Aspects of Computing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Cryptology. --- Law and legislation --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Computer crimes --- Electronics in criminal investigation --- Forensic sciences --- Investigation --- Data processing --- Criminalistics --- Forensic science --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Digital forensic science --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Data mining. --- Information storage and retrieval. --- Computers. --- Law and legislation. --- Computer Science. --- Information Storage and Retrieval. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Data Encryption. --- Data Mining and Knowledge Discovery. --- Legal Aspects of Computing. --- Science --- Criminal investigation --- Crime --- Privacy, Right of --- Information storage and retrieva. --- Computer software. --- Computers --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Software, Computer --- Computer systems --- Cyberspace --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Law and legislation --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Computer networks. --- Cryptography. --- Information technology --- Technology and law --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data centers
Listing 1 - 10 of 11 | << page >> |
Sort by
|