Results 251 to 260 of about 4,412,712 (309)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2006
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet.
Susan Loepp, William K. Wootters
openaire +1 more source
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet.
Susan Loepp, William K. Wootters
openaire +1 more source
Neurocryptographic Information Protection
NBI Technologies, 2022Along with the rapid development of digital communication technologies, which allowed to transmit messages in different forms over the network, the need to protect transmitted data from access by third parties has increased. One of the main ways to protect data is encryption.
Arina Nikishova +2 more
openaire +1 more source
Information protection and information security
2020The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems ...
openaire +1 more source
Protecting Personal Information
2017Introduction When you think about your privacy, you may care a great deal about your personal information. Notice the possessive pronoun: you may think about information about you as “yours,” maybe even as your property.
Leslie P. Francis, John G. Francis
openaire +1 more source
2016
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire +1 more source
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire +1 more source
MILCOM 1987 - IEEE Military Communications Conference - Crisis Communications: The Promise and Reality, 1987
openaire +2 more sources
openaire +2 more sources
INFORMATION PROTECTION IN INFORMATION SYSTEMS
Modeling of systems and processes, 2017Marina Lapshina, N. Yudina
openaire +1 more source

