Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- technology 9 Treffer
- public key infrastructure 6 Treffer
- public-key cryptography 6 Treffer
- certificate authority 5 Treffer
- digital signature 5 Treffer
-
30 weitere Werte:
- key 5 Treffer
- criminology & law 4 Treffer
- encryption 4 Treffer
- media & communications 4 Treffer
- one-time pad 3 Treffer
- transport layer security 3 Treffer
- cryptographic hash function 2 Treffer
- general reference 2 Treffer
- pretty good privacy 2 Treffer
- authentication 1 Treffer
- black and white 1 Treffer
- block cipher 1 Treffer
- certificate server 1 Treffer
- cipher 1 Treffer
- ciphertext 1 Treffer
- cloud computing 1 Treffer
- computer 1 Treffer
- digital signature algorithm 1 Treffer
- electronic signature 1 Treffer
- elliptic curve cryptography 1 Treffer
- english-language films 1 Treffer
- hash function 1 Treffer
- internet 1 Treffer
- linux 1 Treffer
- secondary dominant 1 Treffer
- secrecy 1 Treffer
- secret sharing 1 Treffer
- secure shell 1 Treffer
- signature 1 Treffer
- symmetric-key algorithm 1 Treffer
Verlag
Publikation
- dictionary of communications technology: terms, definitions and abbreviations, wiley 4 Treffer
- britannica concise encyclopedia 1 Treffer
- combating security breaches and criminal activity in the digital sphere 1 Treffer
- cyber warfare and cyber terrorism 1 Treffer
- dictionary of information science and technology 1 Treffer
- 3 weitere Werte:
Sprache
11 Treffer
-
In: The Hutchinson Unabridged Encyclopedia with Atlas and Weather Guide; (2018)Online E-BookZugriff:
-
In: Britannica Concise Encyclopedia; (2017)Online E-BookZugriff:
-
In: Combating Security Breaches and Criminal Activity in the Digital Sphere; (2016)Online E-BookZugriff:
-
In: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security; (2016)Online E-BookZugriff:
-
In: Dictionary of Information Science and Technology; (2013)Online E-BookZugriff:
-
In: Handbook on Securing Cyber-Physical Critical Infrastructure; (2012)Online E-BookZugriff:
-
In: Cyber Warfare and Cyber Terrorism; (2007)Online E-BookZugriff:
-
In: Dictionary of Communications Technology: Terms, Definitions and Abbreviations, Wiley; (1998)Online E-BookZugriff:
-
In: Dictionary of Communications Technology: Terms, Definitions and Abbreviations, Wiley; (1998)Online E-BookZugriff:
-
In: Dictionary of Communications Technology: Terms, Definitions and Abbreviations, Wiley; (1998)Online E-BookZugriff:
-
In: Dictionary of Communications Technology: Terms, Definitions and Abbreviations, Wiley; (1998)Online E-BookZugriff: