Fundamentals of Cryptology A Professional Reference and Interactive Tutorial /
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come...
Main Author: | Tilborg, Henk C. A. van. (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic |
Language: | English |
Published: |
Boston, MA :
Springer US,
2002.
|
Series: | The International Series in Engineering and Computer Science,
528 |
Subjects: | |
Online Access: | View fulltext via EzAccess |
Similar Items
-
The impact of service oriented architecture adoption on organizations /
by: Niknejad, Naghmeh,, et al.
Published: (2019) -
Internet infrastructure : networking, web services, and cloud computing /
by: Fox, Richard, 1964-, et al.
Published: (2018) -
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
Thermodynamics problem solving in physical chemistry : study guide and map /
by: Murphy, Kathleen E., Ph. D.,
Published: (2020) -
Communication systems principles using MATLAB /
by: Leis, John W.,
Published: (2018)