COMPUTERS / Security / Cryptography & Encryption
각 전자책을 클릭하여 상세정보를 조회하거나 제공 사이트를 클릭하여 전문을 조회하실 수 있습니다.
총 520건 중 221 - 240건 출력
-
221Book InfoProgress in Cryptology -- INDOCRYPT 2014 : 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, ProceedingsSpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)
-
222Book InfoPublic-Key Cryptography PKC 2014 : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. ProceedingsSpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)
-
223Book InfoQuerying over Encrypted Data in Smart GridsSpringer e-Book Collection (2014)2014전문보기 (Full Text Access)
-
224Book InfoSecure Information Management Using Linguistic Threshold ApproachSpringer e-Book Collection (2014)2014전문보기 (Full Text Access)
-
225Book InfoSelected Areas in Cryptography SAC 2013 : 20th International Conference, Burnaby, BC, Canada, August 1416, 2013, Revised Selected PapersSpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)
-
226Book InfoThe Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac MemoryO'Reilly Online Learning Platform: Academic/Public Library Edition2014전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2014전문보기 (Full Text Access)
-
227Book InfoThe Hash Function BLAKESpringer e-Book Collection (2014)2014전문보기 (Full Text Access)
-
228Book InfoTopics in Cryptology CT-RSA 2014 : The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. ProceedingsSpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)
-
229Book InfoTransactions on Data Hiding and Multimedia Security IX: Special Issue on Visual CryptographySpringer e-Book Collection (Free Title)2014전문보기 (Full Text Access)
-
230Book InfoSteganography in Digital Media: Principles, Algorithms, and ApplicationsCambridge Books Online (Evidence Based Acquisition)2014전문보기 (Full Text Access)
-
231Book InfoAd Hoc Anonymous Signatures: State of the Art, Challenges and New DirectionsEBSCO eBooks2013전문보기 (Full Text Access)
-
232Book InfoData Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network ProtocolsElsevier e-Book Freedom Collection (Ongoing)2013전문보기 (Full Text Access)ScienceDirect eBooks - Freedom Collection 2013-20162013전문보기 (Full Text Access)O'Reilly Online Learning Platform: Academic/Public Library Edition2012전문보기 (Full Text Access)
-
233Book InfoDiscrete Dynamical Systems and Chaotic Machines: Theory and ApplicationsO'Reilly Online Learning Platform: Academic/Public Library Edition2013전문보기 (Full Text Access)
-
234Book InfoElliptic Curves in Cryptography (London Mathematical Society Lecture Note Series)Cambridge Books Online (Evidence Based Acquisition Ongoing)2013전문보기 (Full Text Access)EBSCO eBooks1999전문보기 (Full Text Access)
-
235Book InfoIntroduction to Computer and Network Security: Navigating Shades of GrayO'Reilly Online Learning Platform: Academic/Public Library Edition2013전문보기 (Full Text Access)
-
236Book InfoManaging Trust in CyberspaceO'Reilly Online Learning Platform: Academic/Public Library Edition2013전문보기 (Full Text Access)
-
237Book InfoNetwork Anomaly Detection: A Machine Learning PerspectiveProQuest Ebook Central - Academic Complete International2013전문보기 (Full Text Access)
-
238Book InfoPairing-Based Cryptography Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected PapersSpringer e-Book Collection (Free Title)2013전문보기 (Full Text Access)
-
239Book InfoProgress in Data Encryption ResearchEBSCO eBooks2013전문보기 (Full Text Access)
-
240Book InfoQuantum Information And Quantum Computing - Proceedings Of Symposium: Proceedings of the SymposiumEBSCO eBooks2013전문보기 (Full Text Access)ProQuest Ebook Central - Academic Complete International2012전문보기 (Full Text Access)