Listing 1 - 10 of 72 | << page >> |
Sort by
|
Choose an application
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- 681.3*E3 --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Sécurité informatique --- Congrès
Choose an application
Computers --- Cryptography --- Ordinateurs --- Cryptographie --- Access control --- Congresses --- Accès --- Contrôle --- Congrès --- 681.3*E3 --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Accès --- Contrôle --- Congrès
Choose an application
Professor Honsberger has succeeded in 'finding' and 'extricating' unexpected and little known properties of such fundamental figures as triangles, results that deserve to be better known. He has laid the foundations for his proofs with almost entirely synthetic methods easily accessible to students of Euclidean geometry early on. While in most of his other books Honsberger presents each of his gems, morsels, and plums, as self contained tidbits, in this volume he connects chapters with some deductive treads. He includes exercises and gives their solutions at the end of the book. In addition to appealing to lovers of synthetic geometry, this book will stimulate also those who, in this era of revitalizing geometry, will want to try their hands at deriving the results by analytic methods. Many of the incidence properties call to mind the duality principle; other results tempt the reader to prove them by vector methods, or by projective transformations, or complex numbers.
Choose an application
Electronic digital computers --- Cryptography --- Data protection --- Ordinateurs --- Cryptographie --- Protection de l'information (Informatique) --- Access control --- Accès --- Contrôle --- 681.3*E3 --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data encryption: data encryption standard DES public key cryptosystems --- Computers --- Cryptography. --- Data protection. --- Access control. --- 681.3*E3 Data encryption: data encryption standard DES public key cryptosystems --- Accès --- Contrôle --- -681.3*E3 --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer security --- cryptografie --- Computer science --- Computers - Access control
Choose an application
Programming --- cryptografie --- 681.3*E3 --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Coding theory. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming
Choose an application
General ethics --- Ethics --- 681.3*E3 --- Deontology --- Ethics, Primitive --- Ethology --- Moral philosophy --- Morality --- Morals --- Philosophy, Moral --- Science, Moral --- Philosophy --- Values --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Computers --- Access control --- #TELE:SISTA --- 681.3*E3 --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Computers - Access control.
Choose an application
Coding theory --- Cryptography --- Codage --- Cryptographie --- 681.3*E3 --- 005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Codage. --- Cryptographie.
Choose an application
Cryptography --- Cryptography. --- 681.3*E3 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Coding theory. --- Codage. --- Codage --- Cryptographie
Listing 1 - 10 of 72 | << page >> |
Sort by
|