Showing 1 - 10 results of 10 for search '"Computer security"', query time: 0.08s Refine Results
  1. 1

    Computer Security Lab Manual /

    Published 2006
    Subjects: “…Computer security Management Handbooks, manuals, etc. 3242…”
    View in OPAC
    Book
  2. 2

    Computer security lab manual /

    Subjects: “…Computer security Management Handbooks, manuals, etc. 10577…”
    Table of contents only
    Contributor biographical information
    View in OPAC
    Book
  3. 3

    Computer Security Lab Manual/ by Nestler,Vincent J, Conklin,Wm.Arthur, White,Gregory B., Hirsch,Matthew P.

    Published 2006
    Subjects: “…computer security 11095…”
    View in OPAC
    Book
  4. 4

    Principles of Information Security / by Whitman, Michael E., 1964-

    Published 2016
    Subjects:
    View in OPAC
    Book
  5. 5
  6. 6

    Mobile Application Security / by Dwivedi, Himanshu

    Published 2010
    Subjects:
    View in OPAC
    Book
  7. 7

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The Master of Information Technology (MIT) mainly deals with the Management of Information Technology focusing on a number of areas including but not limited to business process management, e-services, computer security, technology modeling and data management. …”
    Get full text
    Other
  8. 8

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…Abstract  Authentication is one of the most important factors in the scope of computer security, passwords are the dominant authentication method applied to websites or desktops. …”
    Get full text
    Article
  9. 9

    Speedup signing: pre-rejection sampling towards dilithium by Lianglin Yan, Ming Luo, Mingsheng Wang

    Published 2025-02-01
    “…Applying these two techniques to Dilithium, we obtain an advanced signature scheme with better efficiency, and without any other losses except some pre-computations. Security reduction demonstrates that our scheme is also SUF-CMA in QROM. …”
    Get full text
    Article
  10. 10