Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Electronic digital computers --- Cryptography --- Data protection --- Ordinateurs --- Cryptographie --- Protection de l'information (Informatique) --- Access control --- Accès --- Contrôle --- 681.3*E3 --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data encryption: data encryption standard DES public key cryptosystems --- Computers --- Cryptography. --- Data protection. --- Access control. --- 681.3*E3 Data encryption: data encryption standard DES public key cryptosystems --- Accès --- Contrôle --- -681.3*E3 --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer security --- cryptografie --- Computer science --- Computers - Access control
Choose an application
681.3*D46 --- 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) --- -681.3*D46 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Information warfare --- National security --- Military art and science --- Homeland defense --- Homeland security --- Information warfare - United States --- National security - United States
Choose an application
Computer networks --- Computer crimes --- Privacy, Right of --- Intellectual property --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Social aspects --- Law and legislation --- Computer crimes. --- Privacy, Right of. --- Intellectual property. --- Social aspects. --- Law and legislation. --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Invasion of privacy --- Right of privacy --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Cyberspace --- Intangible property --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Crime
Choose an application
Blogs. --- Information warfare --- Strategy. --- War on Terrorism, 2001-2009 --- Military intelligence --- Blogs. --- Electronic intelligence. --- Information warfare. --- Strategy. --- Blogs. --- Electronic intelligence --- War on Terrorism (2001-2009) --- 2001-2009 --- United States --- United States. --- Armed Forces --- Blogs.
Choose an application
Blogs. --- Information warfare --- Strategy. --- War on Terrorism, 2001-2009 --- Military intelligence --- Blogs. --- Electronic intelligence --- War on Terrorism (2001-2009) --- 2001-2009 --- United States --- United States. --- Armed Forces --- Blogs.
Listing 1 - 5 of 5 |
Sort by
|