نتایج جستجو
Information Modelling and Knowledge Bases XIV
Hannu Jaakkola, 2003
Information Modelling and Knowledge Bases XV
Yasushi Kiyoki, Yasushi Kiyoki, Eiji Kawaguchi, Hannu Jaakkola, Hannu Kangassalo, 2004
Information Modelling and Knowledge Bases XVII
J. Henno, H. Jaakkola Y. Kiyoki, 2006
Information Modelling and Knowledge Bases XVIII
M. DuzaÂ, H. Jaakkola, Y. Kiyoki and H. Kangassalo, Editors, 2007
Information Modelling and Knowledge Bases XX
Y. Kiyoki, Y. Kiyoki, T. Tokuda, H. Jaakkola, X. Chen, N. Yoshida, 2009
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo (auth.), Colin Boyd (eds.), 2001
Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang Zheng (eds.), 2002
Advances in Cryptology — ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings
Arjen K. Lenstra (auth.), Kazuo Ohta, Dingyi Pei (eds.), 1998
Boolean Functions in Cryptology and Information Security
O.A. Logachev, 2008
Disappearing cryptography: information hiding: steganography & watermarking
Peter Wayner, 2008
Information Security and Cryptology - ICISC 2007: 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
Willi Geiselmann, Rainer Steinwandt (auth.), Kil-Hyun Nam, Gwangsoo Rhee (eds.), 2007
Information Security and Cryptology – ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai (auth.), Pil Joong Lee, Jung Hee Cheon (eds.), 2009
Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings
Serge Vaudenay (auth.), Dengguo Feng, Dongdai Lin, Moti Yung (eds.), 2005
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern (auth.), Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.), 2008
Modern Cryptography: Applied Mathematics for Encryption and Information Security
Chuck Easttom, 2015
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, Timothy S. Bergmann, Brady Pamplin, 2006
CISA: Certified Information Systems Auditor Study Guide
David L. Cannon, 2006
CISSP (r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittle, James Michael Stewart, Mike Chapple, Ed Tittel, 2004
CISSP: Certified Information Systems Security Professional Study Guide
James Michael Stewart, Ed Tittel, Mike Chapple, 2005
CISSP: Certified Information Systems Security Professional Study Guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
CISSP: Certified Information Systems Security Professional study guide
Ed Tittel, Mike Chapple, James Michael Stewart, 2003
