Ejemplares similares: Advances in Cryptology – CRYPTO 2013 /
- Advances in Cryptology – CRYPTO 2013 /
- Advances in Cryptology – EUROCRYPT 2013 /
- Advances in Cryptology – ASIACRYPT 2013 /
- Advances in Cryptology – ASIACRYPT 2013 /
- Advances in Cryptology – CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : Proceedings : Part I /
- Advances in Cryptology – CRYPTO 2014 : 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014 : Proceedings : Part II /
Tópico: Protección de Datos
- Internet security for business /
- The End of Privacy : How Total Surveillance is Becoming a Reality /
- Cyberethics : Morality and Law in Cyberspace /
- Técnicas criptográficas de protección de datos /
- Network and Internetworking Security : Principles and Practice /
- Cryptography and Network Security : Principles and Practice/
Tópico: Virus Informáticos
- Advances in Cryptology – ASIACRYPT 2013 /
- Advances in Cryptology – CRYPTO 2013 /
- Advances in Cryptology – CRYPTO 2013 /
- Advances in Cryptology – EUROCRYPT 2013 /
- Computer Security, ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7-11, 2014 : Proceedings, Part I /
- Computer Security, ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7-11, 2014 : Proceedings, Part II /