Limit search to available items
Nearby Subjects are:
Result Page   Prev Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Mark   Year Entries
 

Data encoding (Computer science) -- See Data encryption (Computer science)



--subdivision Code words under topical subdivisions, e.g. Computers--Access control--Code words
  1
 

Data Encryption -- See Computer Security


Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
  1
  Data encryption (Computer science) -- 2 Related Subjects   2
Data encryption (Computer science)   310
Data encryption (Computer science) -- Congresses.   442
Data encryption (Computer science) -- Economic aspects -- Congresses. : Economics of information security and privacy / Tyler Moore, David J. Pym, Christos Ioannidis, editors  2010 1
Data encryption (Computer science) -- Encyclopedias. : Encyclopedia of cryptography and security / Henk C.A. van Tilborg, Sushil Jajodia (eds.)  2011 1
Data encryption (Computer science) -- Examinations -- Study guides. : ExamWise for CIW security professional : exam 1D0-470 / Chad M. Bayer  2003 1
Data encryption (Computer science) -- Fiction. : Cryptonomicon / Neal Stephenson  2000 1
Data encryption (Computer science) -- Government policy.   2
Data encryption (Computer science) -- Government policy -- Australia. : Review of policy relating to encryption technologies  1996 1
Data encryption (Computer science) -- Government policy -- United States. : Surveillance or security? : the risks posed by new wiretapping technologies / Susan Landau  2010 1
Data encryption (Computer science) -- Handbooks, manuals, etc.   2
Data encryption (Computer science) -- History.   2
Data encryption (Computer science) -- Law and legislation.   4
Data encryption (Computer science) -- Law and legislation -- Great Britain.   2
Data encryption (Computer science) -- Law and legislation -- United States.   3
Data encryption (Computer science) -- Malaysia -- Congresses. : Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / Ed Dawson, Serge Vaudenay (eds.)  2005 1
Data encryption (Computer science) -- Mathematical models -- Congresses. : Fault diagnosis and tolerance in cryptography : third international workshop, FDTC 2006, Yokohama, Japan, October 10, 2006 ; proceedings / Luca Breveglieri [and others] (eds.)  2006 1
Data encryption (Computer science) -- Mathematics.   3
Data encryption (Computer science) -- OECD countries. : Cryptography policy : the guidelines and the issues  1998 1
Data encryption (Computer science) -- Periodicals   3
Data encryption (Computer science) -- Political aspects -- Germany : Crypto-politics : encryption and democratic practices in the digital era / Linda Monsees  2020 1
Data encryption (Computer science) -- Political aspects -- United States : Crypto-politics : encryption and democratic practices in the digital era / Linda Monsees  2020 1
Data encryption (Computer science) -- Standards.   2
Data encryption (Computer science) -- Standards -- Congresses.   3
Data encryption (Computer science) -- Standards -- United States. : Algebraic aspects of the advanced encryption standard / by Carlos Cid, Sean Murphy, Matthew Robshaw  2006 1
Data encryption (Computer science) -- Study and teaching : Learn about encodings in R with data from How ISIS uses Twitter dataset (2016) / Feng Shi  2019 1
Data encryption (Computer science) -- United States. : The electronic privacy papers : documents on the battle for privacy in the age of surveillance / [edited by] Bruce Schneier, David Banisar  1997 1
Data encryption (Computer security) : Location privacy protection in mobile networks / by Xinxin Liu, Xiaolin Li  2013 1
 

Data Encryptions -- See Computer Security


Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
  1
 

Data Engineering, International Conference on -- See International Conference on Data Engineering


  1
 

Data entry design -- See Input design, Computer


  1
Electronic data processing -- Data entry.   3
 

Data entry in electronic data processing -- See Electronic data processing Data entry


  1
Data envelopment analysis.   29
Data envelopment analysis -- Handbooks, manuals, etc.   2
 

Data File -- See Information Storage and Retrieval


Organized activities related to the storage, location, search, and retrieval of information
  1
 

Data File, Machine-Readable -- See Information Storage and Retrieval


Organized activities related to the storage, location, search, and retrieval of information
  1
 

Data Files -- See Information Storage and Retrieval


Organized activities related to the storage, location, search, and retrieval of information
  1
 

Data Files, Machine-Readable -- See Information Storage and Retrieval


Organized activities related to the storage, location, search, and retrieval of information
  1
 

Data flow across national borders -- See Transborder data flow


  1
Data flow computing.   5
 

Data flow, Transborder -- See Transborder data flow


  1
 

Data flow, Transboundary -- See Transborder data flow


  1
 

Data flow, Transnational -- See Transborder data flow


  1
 

Data, Fraudulent -- See Scientific Misconduct


Intentional falsification of scientific data by presentation of fraudulent or incomplete or uncorroborated findings as scientific fact
  1
 

Data fusion -- See Multisensor data fusion


  1
Data fusion. : Microsoft, Al-Jazeera, and the Predator: The Challenge of Effects-Based Operations in the Global War on Terrorism  2005 1
 

Data fusion (Statistics) -- See Statistical matching


  1
Add Marked to Bag Add All On Page Add Marked to My Lists
Result Page   Prev Next