Libros sobre el tema "Encryption techniques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Encryption techniques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.
Buscar texto completoLian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.
Buscar texto completoBorivoje, Furht y Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Buscar texto completoHeld, Gilbert. Learn encryption techniques with BASIC and C++. Plano, Tex: Wordware Pub., 1999.
Buscar texto completoGriffiths, James. Investigate, code and compare techniques used in implementing encryption technology. Oxford: Oxford Brookes University, 2003.
Buscar texto completoSwenson, Christopher. Modern cryptanalysis: Techniques for advanced code breaking. Indianapolis, IN: Wiley Pub., 2008.
Buscar texto completoS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers. y Society for Industrial and Applied Mathematics., eds. Mathematics and applications of data/image coding, compression, and encryption III: 2 August 2000, San Diego, USA. Bellingham, Wash., USA: SPIE, 2000.
Buscar texto completoS, Schmalz Mark y Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VII, with applications: 4-5 August, 2004, Denver, Colorado, USA. Bellingham, Wash: SPIE, 2004.
Buscar texto completoShih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Boca Raton, Fl: Taylor & Francis, 2008.
Buscar texto completoWold, Geoffrey H. Computer crime: Techniques, prevention. Rolling Meadows, Ill: Bankers Pub. Co., 1989.
Buscar texto completoX, Ritter G. y Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image pattern recognition, compression, coding, and encryption X, with applications: 26-27 August, 2007, San Diego, California, USA. Bellingham, Wash: SPIE, 2007.
Buscar texto completoS, Schmalz Mark y Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption: 21-22 July 1998, San Diego, California. Bellingham, Wash., USA: SPIE, 1998.
Buscar texto completoEUROCRYPT, '00 (2000 Bruges Belgium). Advances in cryptology: EUROCRYPT 2000 ; International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 ; proceedings. Berlin: Springer, 2000.
Buscar texto completo1963-, Preneel Bart, ed. Advances in cryptology: EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :; proceedings. Berlin: Springer, 2000.
Buscar texto completoChaum, David. Advances in Cryptology -- EUROCRYPT' 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, the Netherlands, April 13-15, 1987 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 1988.
Buscar texto completoprofesseur, Stern Jacques, ed. Advances in cryptology, EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999 : proceedings. Berlin: Springer, 1999.
Buscar texto completoNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Buscar texto completoNATO Advanced Study Institute on Fractal Image Encoding and Analysis (1995 Trondheim, Norway). Fractal image encoding and analysis. Berlin: Springer, 1998.
Buscar texto completoS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers. y Boeing Company, eds. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. Bellingham, Wash., USA: SPIE, 2003.
Buscar texto completoname, No. Mathematics of data/image coding, compression, and encryption V, with applications: 9-10 July 2002, Seattle, Washington, USA. Bellingham, WA: SPIE, 2003.
Buscar texto completoS, Schmalz Mark y Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption IV, with applications: 30-31 July, 2001, San Diego, USA. Bellingham, Wash: SPIE, 2001.
Buscar texto completoS, Schmalz Mark y Society of Photo-optical Instrumentation Engineers., eds. Mathematics of data/image coding, compression, and encryption VI, with applications: 5 and 7 August 2003, San Diego, California, USA. Bellingham, Wash., USA: SPIE, 2004.
Buscar texto completoYan, Zhang y SpringerLink (Online service), eds. RFID Security: Techniques, Protocols and System-on-Chip Design. Boston, MA: Springer-Verlag US, 2009.
Buscar texto completo(Society), SPIE, ed. Mathematics for signal and information processing: 2-5 August 2009, San Diego, California, United States. Bellingham, Wash: SPIE, 2009.
Buscar texto completoS, Schmalz Mark, Society of Photo-optical Instrumentation Engineers. y Society for Industrial and Applied Mathematics., eds. Mathematics of data/image coding, compression, and encryption II: 19-20 July, 1999, Denver, Colorado. Bellingham, Washington: SPIE, 1999.
Buscar texto completoSchmalz, Mark S. Mathematics of data/image coding, compression, and encryption with applications XII: 2-4 August 2010, San Diego, California, United States. Editado por Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2010.
Buscar texto completoKaisa, Nyberg y International Association for Cryptologic Research., eds. Advances in cryptology: EUROCRYPT '98 : International Conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31 - June 4, 1998 : proceedings. Berlin: Springer, 1998.
Buscar texto completoLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.
Buscar texto completoMultimedia Content Encryption: Techniques and Applications. AUERBACH, 2008.
Buscar texto completoLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Buscar texto completoLian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Auerbach Publishers, Incorporated, 2008.
Buscar texto completoFurht, Borko y Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Editado por Borko Furht y Darko Kirovski. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013450.
Texto completoFurht, Borko y Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Buscar texto completoFurht, Borivoje y Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.
Buscar texto completoFurht, Borko y Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Buscar texto completoFurht, Borko y Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Buscar texto completoFurht, Borko y Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Buscar texto completoTanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.
Buscar texto completoKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Limited, John, 2020.
Buscar texto completoKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Buscar texto completoKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2019.
Buscar texto completoKnight, Alissa. Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley & Sons, Incorporated, John, 2020.
Buscar texto completoMcAmis, Monica. Steganographic techniques in cryptography. 2000.
Buscar texto completoSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2012.
Buscar texto completoSwenson, Christopher. Modern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley & Sons, Incorporated, John, 2009.
Buscar texto completoModern Cryptanalysis: Techniques for Advanced Code Breaking. Wiley, 2008.
Buscar texto completoAhmad, Khaleel, M. N. Doja, Nur Izura Udzir y Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Buscar texto completoAhmad, Khaleel, M. N. Doja, Nur Izura Udzir y Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Buscar texto completoAhmad, Khaleel, M. N. Doja, Nur Izura Udzir y Manu Pratap Singh. Emerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Buscar texto completoEmerging Security Algorithms and Techniques. Taylor & Francis Group, 2019.
Buscar texto completo