Siga este link para ver outros tipos de publicações sobre o tema: Encryption.

Livros sobre o tema "Encryption"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores livros para estudos sobre o assunto "Encryption".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.

1

Ahmad, Khairol Amali Bin, Khaleel Ahmad e Uma N. Dulhare, eds. Functional Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-60890-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Wheeler, David. Block encryption. Cambridge: University of Cambridge Computer Laboratory, 1987.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Ren, Kui, e Cong Wang. Searchable Encryption. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21377-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Fatal encryption. Port Moody, B.C: Gypsy Moon Press, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Koç, Çetin Kaya, Funda Özdemir e Zeynep Ödemiş Özger. Partially Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87629-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Biryukov, Alex, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74619-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Canteaut, Anne, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34047-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Leander, Gregor, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Preneel, Bart, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60590-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Gollmann, Dieter, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-60865-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Chatterjee, Sanjit, e Palash Sarkar. Identity-Based Encryption. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Dunkelman, Orr, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03317-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Goos, Gerhard, Juris Hartmanis, Jan van Leeuwen e Bruce Schneier, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44706-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Cid, Carlos, e Christian Rechberger, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Biham, Eli, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0052329.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Robshaw, Matthew, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11799313.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Joux, Antoine, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21702-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Matsui, Mitsuru, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45473-x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Hong, Seokhie, e Tetsu Iwata, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Daemen, Joan, e Vincent Rijmen, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45661-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Moriai, Shiho, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43933-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Anderson, Ross, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58108-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Vaudenay, Serge, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Peyrin, Thomas, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Roy, Bimal, e Willi Meier, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98177.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Gilbert, Henri, e Helena Handschuh, eds. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137506.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Johansson, Thomas, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b93938.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Nyberg, Kaisa, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71039-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Knudsen, Lars, ed. Fast Software Encryption. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48519-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

1969-, Sarkar Palash, e SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Kiayias, Aggelos, e Serdar Pehlivanoglu. Encryption for Digital Content. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-0044-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Yi, Xun, Russell Paulet e Elisa Bertino. Homomorphic Encryption and Applications. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12229-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Dobbertin, Hans, Vincent Rijmen e Aleksandra Sowa, eds. Advanced Encryption Standard – AES. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b137765.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Bishop, Matt. The fast encryption package. [Moffett Field, CA]: Research Institute for Advanced Computer Science, 1989.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Computer Systems Laboratory (U.S.), ed. Escrowed Encryption Standard (EES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Smith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Edin, Muharemagic, e Socek Daniel, eds. Multimedia encryption and watermarking. New York: Springer, 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Mikhailov, Sergey. Fractal modulation and encryption. Leicester: De Montfort University, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Personal encryption clearly explained. San Diego: AP Professional, 1998.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Serdar, Pehlivanoglu, e SpringerLink (Online service), eds. Encryption for Digital Content. Boston, MA: Springer Science+Business Media, LLC, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Library of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Lauter, Kristin, Wei Dai e Kim Laine, eds. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Blinn, Eric. Managing SQL Server Encryption Certificates. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5151-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Blinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Ciesla, Robert. Encryption for Organizations and Individuals. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6056-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Coles, Michael, e Rodney Landrum. Expert SQL Server 2008 Encryption. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Xu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Collins, Lauren M. Mobile Encryption: Securing and Encrypting Mobile Devices. Taylor & Francis Group, 2021.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia