This book constitutes the refereed post-conference proceedings of the 5th Int…
2,000 producten gevonden in Data Encryptie
Resultaten
![Afbeelding voor Lecture Notes in Computer Science 10098 - Lightweight Cryptography for Security and Pri…](https://shoptiment.nl/wp-content/uploads/shoptiment/6/lecture-notes-in-computer-science-10098-lightweight-cryptography-for-security-and-prihellip-M-ljkffdlhhjdgg.jpg)
Lecture Notes in Computer Science 10098 - Lightweight Cryptography for Security and Pri…
![Afbeelding voor CYBER SECURITY HANDBOOK Part-2](https://shoptiment.nl/wp-content/uploads/shoptiment/6/cyber-security-handbook-part2-M-ljkfjhhghfclf.jpg)
CYBER SECURITY HANDBOOK Part-2
"Are you ready to fortify your digital defenses and navigate the ever-evolvin…
![Afbeelding voor Investigating Cryptocurrencies](https://shoptiment.nl/wp-content/uploads/shoptiment/6/investigating-cryptocurrencies-M-ljkdddlgkchkj.jpg)
Investigating Cryptocurrencies
An Essential Guide to the Tools and Techniques of Cryptocurrency Forensics…
![Afbeelding voor Python Tools for Scientists](https://shoptiment.nl/wp-content/uploads/shoptiment/6/python-tools-for-scientists-M-ljkdjdkhceiii.jpg)
Python Tools for Scientists
Doing Science With Python introduces readers to the most popular coding tools fo…
![Afbeelding voor Network Engineer's Bible](https://shoptiment.nl/wp-content/uploads/shoptiment/6/network-engineers-bible-M-ljkdkflfkjjkg.jpg)
Network Engineer's Bible
Introducing the Network Engineer's Bible
Are you ready to unlock the …
![Afbeelding voor The Art of Deception](https://shoptiment.nl/wp-content/uploads/shoptiment/6/the-art-of-deception-M-ljkdjchehlgch.jpg)
The Art of Deception
In his worldwide bestseller Secrets and Lies, Bruce Schneier made the case th…
![Afbeelding voor Understanding Cryptography](https://shoptiment.nl/wp-content/uploads/shoptiment/6/understanding-cryptography-M-ljkfiieilccie.jpg)
Understanding Cryptography
Understanding and employing cryptography has become central for securing virtual…
![Afbeelding voor Hands-On Cryptography with Python](https://shoptiment.nl/wp-content/uploads/shoptiment/6/handson-cryptography-with-python-M-ljkdjklhfjlgl.jpg)
Hands-On Cryptography with Python
Learn to evaluate and compare data encryption methods and attack cryptograph…
![Afbeelding voor GDPR. Privacy Risk Management.](https://shoptiment.nl/wp-content/uploads/shoptiment/6/gdpr-privacy-risk-management-M-ljkkkfdihkcli.jpg)
GDPR. Privacy Risk Management.
La protezione delle persone fisiche con riguardo al trattamento dei dati di …
![Afbeelding voor Codes and Ciphers - A History Of Cryptography](https://shoptiment.nl/wp-content/uploads/shoptiment/6/codes-and-ciphers-a-history-of-cryptography-M-ljkdgcijlkhki.jpg)
Codes and Ciphers - A History Of Cryptography
This vintage book contains Alexander D?Agapeyeff?s famous 1939 work, ?Codes and …