Data encryption (Computer science)
Label
Data encryption (Computer science)
Name
Data encryption (Computer science)
Actions
Incoming Resources
- Subject of18
- Getting started with z/OS data set encryption, Bill White [and nine others]
- SSCP video course, Shon Harris, Domain 5
- Machine learning in image steganalysis, Hans Georg Schaathun
- Introduction to computer and network security, navigating shades of gray, Richard R. Brooks, Clemson University, South Carolina, USA
- Encryption facility for z/OS version 1.10, [Patrick Kappeler and others]
- Blockchain basics, a non-technical introduction in 25 steps /, Daniel Drescher
- The truth machine, the blockchain and the future of everything, Michael J. Casey and Paul Vigna
- Asymmetric cryptography, primitives and protocols, coordinated by David Pointcheval
- Group theoretic cryptography, María Isabel González Vasco, Rainer Steinwandt
- Healthcare information privacy and security, regulatory compliance and data security in the age of electronic health records, Bernard Peter Robichau
- Introduction to Cryptography with Open-Source Software
- Platform embedded security technology revealed, safeguarding the future of computing with Intel Embedded Security and Management Engine, Xiaoyu Ruan
- Security of block ciphers, from algorithm design to hardware implementation, Kazuo Sakiyama, Yu Sasaki, Yang Li
- Suits and Spooks Conference, attacks, threats, and defense in cyberspace : compete video compilation
- Image encryption, a communication perspective, Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili
- Hands-on cryptography with Java, Erik Costlow
- The unbreakable one-time pad cipher
- Pro cryptography and cryptanalysis with C++20, creating and programming advanced algorithms, Marius Iulian Mihailescu, Stefania Loredana Nita
- Demystifying Cryptography with OpenSSL 3.0, Discover the Best Techniques to Enhance Your Network Security with OpenSSL 3. 0, Alexei Khlebnikov ; foreword by Jarle Adolfsen
- Application security in the ISO 27001:2013 environment, Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan
- Managing SQL Server encryption certificates, getting started with SQL Server encryption, Eric Blinn
- Z/OS version 1 release 8 RACF implementation, [Paul Rogers and others]
- Implementing SSL/TLS using cryptography and PKI, Joshua Davies
- SSH, the secure shell, the definitive guide, Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes
- Crafting the InfoSec playbook, Jeff Bollinger, Brandon Enright & Matthew Valites
- Hadoop security, Ben Spivey & Joey Echeverria
- Blockchain, blueprint for a new economy, Melanie Swan
- Blockchain in Action, Bina Ramamurthy
- Blockchain, kurz & gut, Kai Brünnler
- Data-at-rest Encryption for the IBM Spectrum Accelerate family, Bert Dufrasne, Roman Fridli, Andrew Greenfield
- Building the infrastructure for cloud security, a solutions view, Raghu Yeluri, Enrique Castro-Leon
- Modern cryptography, applied mathematics for encryption and information security, Chuck Easttom
- Simple steps to data encryption, a practical guide to secure computing, Peter Loshin
- Blockchain for dummies, by Tiana Laurence
- Blockchain, by Tiana Laurence