Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Choose an application
World War, 1939-1945 --- World War, 1939-1945 --- World War, 1939-1945 --- 2ème guerre mondiale --- 2ème guerre mondiale --- 2ème guerre mondiale --- Cryptography. --- Secret service --- Personal narratives, British. --- Cryptographie --- Service secret --- Récits personnels anglais --- Welchman, Gordon
Choose an application
Computers --- Data protection --- Public key cryptography --- Access control --- -Data protection --- 681.3*D46 --- 681.3*E3 --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer security --- Computers - Access control
Choose an application
Confidential communications --- Cryptography --- Secret professionnel --- Cryptographie --- 519.7 --- 681.3*E3 --- AA / International- internationaal --- 654 --- Communications, Confidential --- Confidential relationships --- Confidentiality --- Privileged communications (Confidential communications) --- Professional secrets --- Secrets, Professional --- Confession --- Criminal law --- Evidence (Law) --- Objections (Evidence) --- Personality (Law) --- Professional ethics --- Secrecy --- Privacy, Right of --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Mathematical cybernetics --- Data encryption: data encryption standard; DES; public key cryptosystems --- Informatieverwerking. Bureautica. --- Law and legislation --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 519.7 Mathematical cybernetics --- Cryptography. --- Informatieverwerking. Bureautica
Listing 1 - 4 of 4 |
Sort by
|