COMPUTERS / Security / Cryptography & Encryption
각 전자책을 클릭하여 상세정보를 조회하거나 제공 사이트를 클릭하여 전문을 조회하실 수 있습니다.
총 520건 중 201 - 220건 출력
-
201Book InfoBig Data Forensics - Learning Hadoop Investigations: Perform Forensic Investigations on Hadoop Clusters with Cutting-edge Tools and TechniquesEBSCO eBooks2015전문보기 (Full Text Access)
-
202Book InfoBlockchain : Blueprint for a New EconomyO'Reilly Online Learning Platform: Academic/Public Library Edition2015전문보기 (Full Text Access)
-
203Book InfoCISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th EditionEBSCO eBooks2015전문보기 (Full Text Access)
-
204Book InfoCryptography and Network SecurityEBSCO eBooks2015전문보기 (Full Text Access)
-
205Book InfoEncrypted Email: The History and Technology of Message PrivacySpringer e-Book Collection (2015)2015전문보기 (Full Text Access)
-
206Book InfoEssential Cybersecurity Science: Build, Test, and Evaluate Secure SystemsO'Reilly Online Learning Platform: Academic/Public Library Edition2015전문보기 (Full Text Access)
-
207Book InfoFoundations of Coding: Compression, Encryption, Error CorrectionProQuest Ebook Central - Academic Complete International2015전문보기 (Full Text Access)
-
208Book InfoMultilevel Modeling of Secure Systems in QoP-MLO'Reilly Online Learning Platform: Academic/Public Library Edition2015전문보기 (Full Text Access)
-
209Book InfoPractical Cryptography: Algorithms and Implementations Using C++EBSCO e-Book Collection (NetLibrary 16th) - 20182015전문보기 (Full Text Access)EBSCO eBooks2015전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)
-
210Book InfoSmart TV Security: Media Playback and Digital Video BroadcastSpringer e-Book Collection (2015)2015전문보기 (Full Text Access)
-
211Book InfoVisual Cryptography for Image Processing and Security: Theory, Methods, and Applications, Second EditionSpringer e-Book Collection (2015)2015전문보기 (Full Text Access)
-
212Book InfoAdvances in Cryptology EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. ProceedingsSpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)
-
213Book InfoBitcoin for the BefuddledO'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)
-
214Book InfoCryptographic Hardware and Embedded Systems – CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014. ProceedingsSpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)
-
215Book InfoCyber Security and IT Infrastructure ProtectionEBSCO eBooks2014전문보기 (Full Text Access)ScienceDirect eBooks - Freedom Collection 2013-20172014전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2013전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2013전문보기 (Full Text Access)
-
216Book InfoHomomorphic Encryption and ApplicationsSpringer e-Book Collection (2014)2014전문보기 (Full Text Access)
-
217Book InfoHow I Discovered World War II's Greatest Spy and Other Stories of Intelligence and CodeO'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)
-
218Book InfoInteger Algorithms in Cryptology and Information AssuranceEBSCO eBooks2014전문보기 (Full Text Access)
-
219Book InfoMastering BitcoinO'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)
-
220Book InfoPairing-Based Cryptography – Pairing 2013: 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected PapersSpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)