Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Decryption.

Bücher zum Thema „Decryption“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Decryption" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Martínez-Guerra, Rafael, Juan Javier Montesinos-García, and Juan Pablo Flores-Flores. Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20698-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Paulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung / = The Phaistos disk : an approach to its decryption. 2nd ed. Hamburg: Verlag Dr. Kovac, 2017.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Paulus, Max. Der Diskos von Phaistos: Ein Ansatz zu seiner Entschlüsselung = The Phaistos disk : an approach to its decryption. Hamburg: Kovac, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Decryption. KJB Writing Services, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Decryption. KJB Writing Services, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Beardsley, Ian. Et Decryption. Lulu Press, Inc., 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Marks, Philip. Decryption Engine. Independently Published, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Countdown to Decryption. Pandamoon Publishing, 2024.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Muniraj, Inbarasan, and John T. Sheridan. Optical Encryption and Decryption. SPIE, 2019. http://dx.doi.org/10.1117/3.2523506.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Decryption of Indus Scripts. Internet, 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Decryption of the Vedas. Independently Published, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Nagelhout, Ryan. Digital ERA Encryption and Decryption. Rosen Publishing Group, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Nagelhout, Ryan. Digital Era Encryption and Decryption. Rosen Publishing Group, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Decryption of Yuding Qimen Treasures. CHINA CULTURE PRESS INC., 2024.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Swearingen, Loren L. Decryption of the Zodiac Z18 Code. Lulu Press, Inc., 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Swearingen, Loren L. Decryption of the Lipstick Killer Wall Code. Loren L Swearingen, 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Gordesli, M. Melih. Decryption of Genesis: When God Divided the Cell. Independently Published, 2019.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Lucas, Raphaël, Mehdi El Kanafi, and Nicolas Courcier. Legend of Final Fantasy IX: Creation - Universe - Decryption. Third Editions, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

The Bloody Thumbprint of a Genius: How Shakespeare told us who he really was. 2023: HULME PUBLICATIONS, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Swearingen, Loren L. Decryption of the 1st Layer of the Zodiac 340 Cryptogram. Loren L Swearingen, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Decryption of the 1st Layer of the Zodiac 340 Cryptogram. Lulu Press, Inc., 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Swearingen, Loren L. Decryption of the 1st Layer of the Zodiac 340 Cryptogram. Createspace Independent Publishing Platform, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Beginners Guide to Cryptography - Introduction to Cryptography, Encryption and Decryption. Independently Published, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Sanín-Restrepo, Ricardo. Being and Contingency. The Rowman & Littlefield Publishers Group, 2020. https://doi.org/10.5040/9798881810238.

Der volle Inhalt der Quelle
Annotation:
Heidegger´s construction of Being is paramount in Western philosophy and arguably the most enduring effort to construct a presupposition free ontology. Nevertheless, using the theory of encryption of power, we can discover that the result of his effort is a sophisticated perpetuation of a kind of knowing and of doing that alienates the possibility of any kind of politics as a commonality of differences. This book connects the theory of encryption of power with an array of ground-breaking philosophical and scientific traditions of the last hundred years in order to perforate and depose Heidegger´s metaphysics, through his construction of the ready-to-hand. Through a hypothetical language game, based on Wittgenstein´s “language games” (The “X” game of language) this book decrypts Heidegger´s construction of Being while also decrypting and empowering the Wittgensteinian philosophy of language along with it. The idea of decryption demonstrates that, through particular forms of language use and philosophy, the world as we know it is encrypted; forms of resistance and life are covered over by a surface of control and determination that leads to economic and political forms like capitalism, fascism and liberalism. Decryption is a way of unconcealing what has been concealed. By staging this encounter, Sanin-Restrepo brings the insights of decolonial theory to bear on the main body of Western philosophy and directly on Heidegger himself.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Swearingen, Loren L. Decryption of the Zodiac Z18 Code: And the "Anti-Z18" Code. Loren L Swearingen, 2016.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Fargo, Brian, and Erwan Lafleuriel. Fallout Saga : Collector's Edition: A Tale of Mutation, Creation, Universe, Decryption. Third Editions, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus. Springer, 2024.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Flores-Flores, Juan Pablo, Rafael Martínez-Guerra, and Juan Javier Montesinos-García. Encryption and Decryption Algorithms for Plain Text and Images Using Fractional Calculus. Springer, 2023.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Redbooks, IBM. Mqseries Security: Example of Using a Channel Security Exit, Encryption and Decryption. Ibm, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Key of Leedskalnin : : The Complete Decryption of, a Book in Every Home. Independently Published, 2022.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Gamble, Christopher. Shake-spear's Voyage to America: Decryption of the Title Page of the Sonnets. Cappella Archive, 2005.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Hoyos, Arturo de. Daniel Parker's Masonic Tablet: A History, Decryption, and Facsimile of America's First Cipher Ritual. Supreme Council, The/Thirty Three Degrees, 2019.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Stading, Mark. Holy Days Code: How the Law and the Gospel Are an Encryption/Decryption Messaging System. Lulu Press, Inc., 2012.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Basavaiah, Manjunath. Design and Implementation of Telemedicine Client-Server Model Using Encryption and Decryption Algorithm in Single Core and Multicore Architecture on L. GRIN Verlag GmbH, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.

Der volle Inhalt der Quelle
Annotation:
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Hodel, Steve. Most Evil II: Presenting the Follow-Up Investigation and Decryption of the 1970 Zodiac Cipher in Which the San Francisco Serial Killer Reveals. Rare Bird Books, 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Most Evil II: Presenting the Follow-Up Investigation and Decryption of the 1970 Zodiac Cipher in Which the San Francisco Killer Reveals His Tr. Rare Bird Books, 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Sanín-Restrepo, Ricardo. Decrypting Power. Rowman & Littlefield Publishers, Incorporated, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Greco, Mario. Decrypting Wifi. Independently Published, 2019.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Sanín-Restrepo, Ricardo. Decrypting Power. Rowman & Littlefield Publishers, Incorporated, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Decrypting Power. Rowman & Littlefield International, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Busu, Oprea-Valentin. Psychosocial Characteristics of Images of Power in Mass Communication. Editura Universitara, 2021. http://dx.doi.org/10.5682/9786062812621.

Der volle Inhalt der Quelle
Annotation:
Different categories of specialists in social sciences as well as different categories of proffesional communicators will find here a synthetic picture of the more significant classical and modern theories regarding the role of power as a ”Fundamental phenomenon that regulates and organizes social life”, and as it appears to us: a brute force, an alluring mermaid, a possessor of saving solutions and skills etc. Also, because we live in a time when direct communication is outdated, the author analyzes the media system mainly under the aspect of image construction or personalized representation of power. A special mention also deserves the fact that the author achieves his goals by using a multiple perspective - social, psychosociological, anthropological. This approach is not a final decryption of the contents of the concepts of power and communication - image, but is part of a continuum of efforts to reveal the rich, challenging social reality, thus bringing his own contribution both to finding answers and to the birth of new questions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Greco, Mario. DECRYPTING WIFI Essential. Independently published, 2019.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Decrypting the Encryption Debate. Washington, D.C.: National Academies Press, 2018. http://dx.doi.org/10.17226/25010.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Rodriguez, Jose. Language Breakdown: - Decrypting Spanish -. Independently Published, 2018.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Redfield, Marc. Shibboleth. Fordham University Press, 2020. http://dx.doi.org/10.5422/fordham/9780823289066.001.0001.

Der volle Inhalt der Quelle
Annotation:
In the Book of Judges, the Gileadites use the word shibboleth to target and kill members of a closely related tribe, the Ephraimites, who cannot pronounce the initial shin phoneme. In modern European languages, shibboleth has come to mean a hard-to-falsify sign that winnows identities and establishes and confirms borders; it has also acquired the ancillary meanings of slogan or cliché. The semantic field of shibboleth thus seems keyed to the waning of the logos in an era of technical reproducibility—to the proliferation of technologies and practices of encryption, decryption, exclusion and inclusion that saturate modern life. In the context of an unending refugee crisis and a general displacement, monitoring and quarantining of populations within a global regime of technics, Paul Celan’s subtle yet fierce reorientation of shibboleth merits scrupulous reading. Building on Jacques Derrida’s Shibboleth: For Paul Celan, but following its own itinerary, this book interprets the episode in Judges together with texts by Celan, passages from William Faulkner’s Absalom! Absalom!, and Doris Salcedo’s 2007 installation Shibboleth at the Tate Modern, pursuing the track of a word to which no language can properly lay claim—a word that is both less and more than a word, that signifies both the epitome and the ruin of border control technology, and that thus, despite its violent role in the Biblical story, offers Celan a locus of poetico-political affirmation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Copeland, Cairo. Decrypting Crypto: Crypto Investing for Beginners. Independently Published, 2021.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Being and Contingency: Decrypting Heidegger's Terminology. Rowman & Littlefield Publishers, Incorporated, 2020.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Holocaust Codes: Decrypting the Final Solution. Blake Publishing, Limited, John, 2024.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

author, Ellsworth Joseph 1987, ed. Crack the code: Decrypting your job search. 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!