Data editing -- Computer programs : A data scientist's guide to acquiring, cleaning and managing data in R / by Samuel Buttrey, Naval Postgraduate School, California, United States, Lyn R. Whitaker, Naval Postgraduate School, California, United States
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
Data encryption (Computer science) -- Malaysia -- Congresses : Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / Ed Dawson, Serge Vaudenay (eds.)
Data encryption (Computer science) -- OECD countries : Cryptography Policy : the Guidelines and the Issues (The OECD Cryptography Policy Guidelines and the Report on Background and Issues of Cryptography Policy)
Data encryption -- Congresses : Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext : Proceedings of a Workshop
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data