Data editing -- Computer programs : A data scientist's guide to acquiring, cleaning and managing data in R / by Samuel Buttrey, Naval Postgraduate School, California, United States, Lyn R. Whitaker, Naval Postgraduate School, California, United States
2017
1
--subdivision Code words under topical subdivisions, e.g. Computers--Access control--Code words
1
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
1
Data encryption.
71
Data encryption (Computer science)
--
2 Related Subjects
2
Data encryption (Computer science)
1096
Data encryption (Computer science) -- Congresses
675
Data encryption (Computer science) -- Economic aspects -- Congresses : Economics of information security and privacy / Tyler Moore, David J. Pym, Christos Ioannidis, editors
2010
1
Data encryption (Computer science) -- Encyclopedias : Encyclopedia of cryptography and security / Henk C.A. van Tilborg, Sushil Jajodia (eds.)
2011
1
Data encryption (Computer science) -- Examinations -- Study guides. : ExamWise for CIW security professional : exam 1D0-470 / Chad M. Bayer
2003
1
Data encryption (Computer science) -- Fiction. : Cryptonomicon / Neal Stephenson
2000
1
Data encryption (Computer science) -- Government policy.
3
Data encryption (Computer science) -- Government policy -- United States
2
Data encryption (Computer science) -- Handbooks, manuals, etc
3
Data encryption (Computer science) -- History
3
Data encryption (Computer science) -- Law and legislation.
8
Data encryption (Computer science) -- Law and legislation -- Great Britain.
2
Data encryption (Computer science) -- Law and legislation -- United States.
4
Data encryption (Computer science) -- Malaysia -- Congresses : Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / Ed Dawson, Serge Vaudenay (eds.)
2005
1
Data encryption (Computer science) -- Mathematical models -- Congresses : Fault diagnosis and tolerance in cryptography : third international workshop, FDTC 2006, Yokohama, Japan, October 10, 2006 ; proceedings / Luca Breveglieri [and others] (eds.)
2006
1
Data encryption (Computer science) -- Mathematics
8
Data encryption (Computer science) -- Moral and ethical aspects : Cypherpunk ethics : radical ethics for the digital age / Patrick D. Anderson
2022
1
Data encryption (Computer science) -- OECD countries. : Cryptography policy : the guidelines and the issues
1998
1
Data encryption (Computer science) -- Periodicals
4
Data encryption (Computer science) -- Political aspects -- Germany : Crypto-politics : encryption and democratic practices in the digital era / Linda Monsees
2020
1
Data encryption (Computer science) -- Political aspects -- United States : Crypto-politics : encryption and democratic practices in the digital era / Linda Monsees
2020
1
Data encryption (Computer science) -- Standards.
2
Data encryption (Computer science) -- Standards -- Congresses
3
Data encryption (Computer science) -- Standards -- United States. : Algebraic aspects of the advanced encryption standard / by Carlos Cid, Sean Murphy, Matthew Robshaw
2006
1
Data encryption (Computer science) -- Study and teaching : Learn about encodings in R with data from How ISIS uses Twitter dataset (2016) / Feng Shi
2019
1
Data encryption (Computer security) : Location privacy protection in mobile networks / by Xinxin Liu, Xiaolin Li
2013
1
Data Encryption Standard : The block cipher companion / Lars R. Knudsen, Matthew J.B. Robshaw
2011
1
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data
1
1
1
Electronic data processing -- Data entry.
5
Electronic data processing -- Data entry -- Government policy -- Alberta : Shoppers' privacy violated at major Canadian malls : privacy commissioners
2020
1
Electronic data processing -- Data entry -- Government policy -- British Columbia : Shoppers' privacy violated at major Canadian malls : privacy commissioners
2020
1
Electronic data processing -- Data entry -- Government policy -- Canada : Shoppers' privacy violated at major Canadian malls : privacy commissioners
2020
1
1
Data-Envelopment-Analyse. : Efficiency, market dynamics and industry growth / Jati Sengupta and Phillip Fanchon
2009
1
Data envelopment analysis.
34
Data envelopment analysis -- Handbooks, manuals, etc
2
Organized activities related to the storage, location, search, and retrieval of information
1
Organized activities related to the storage, location, search, and retrieval of information
1
Organized activities related to the storage, location, search, and retrieval of information
1
Organized activities related to the storage, location, search, and retrieval of information
1
1
Data flow computing.
15
1
Add Marked to Bag
Add All On Page
Add Marked to My Lists