Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Computer security. --- Digital watermarking. --- Data protection. --- 681.3*E4 --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Watermarking, Digital --- Data encryption (Computer science) --- Watermarks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Security measures --- Cyber security --- Cybersecurity --- Digital watermarking --- Sécurité informatique --- Filigranes numériques --- Protection de l'information (Informatique) --- Protection of computer systems --- Protection --- Computer security --- Image steganography
Choose an application
This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together.
Computer security. --- Digital watermarking. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Watermarking, Digital --- Image steganography --- Watermarks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Listing 1 - 3 of 3 |
Sort by
|