BOOKS - PROGRAMMING - Cryptographic and Information Security Approaches for Images an...
Cryptographic and Information Security Approaches for Images and Videos - S. Ramakrishnan 2018 PDF CRC Press BOOKS PROGRAMMING
ECO~29 kg CO²

3 TON

Views
26660

Telegram
 
Cryptographic and Information Security Approaches for Images and Videos
Author: S. Ramakrishnan
Year: 2018
Format: PDF
File size: 19 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders
Cryptography Arithmetic: Algorithms and Hardware Architectures (Advances in Information Security)
Introduction to Machine Learning with Applications in Information Security 2nd Edition
Developing People|s Information Capabilities: Fostering Information Literacy in Educational, Workplace and Community Contexts (Library and Information Science, 8)
Blockchains: A Handbook on Fundamentals, Platforms and Applications (Advances in Information Security 105)
Blockchain for Cybersecurity in Cyber-Physical Systems (Advances in Information Security, 102)
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Personal Information Security & Systems Architecture Techniques for PII Management in a Business
Sensor Network Methodologies for Smart Applications (Advances in Information Security, Privacy, and Ethics)
Complete Guide to Building An Information Security Program: Connecting Polices, Procedures, and IT Standards
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
The State Secrets Privilege and Other Limits on Classified Information (American Political, Economic, and Security Issues)
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications (Advances in Information Security, 68)
(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
Software Quality. Model-Based Approaches for Advanced Software and Systems Engineering: 6th International Conference, SWQD 2014, Vienna, Austria, … in Business Information Processing, 166)
Homeland Security Technology Challenges: From Sensing and Encrypting to Mining and Modeling (Artech House Intelligence and Information Operations)
Algorithms: Big Data, Optimization Techniques, Cyber Security (De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences, 17)
Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, … Business Information Processing Boo
Information Security Incident and Data Breach Management A Step-by-Step Approach
Information Security Incident and Data Breach Management A Step-by-Step Approach
Enterprise Information Security Architecture: The Ultimate Step-By-Step Guide
Fault Analysis in Cryptography (Information Security and Cryptography)
Mystical Traditions: Approaches to Peaceful Coexistence (Interdisciplinary Approaches to the Study of Mysticism)
Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
Red Alert: Marxist Approaches to Science Fiction Cinema (Contemporary Approaches to Film and Media Series)
Pseudorandomness and Cryptographic Applications
Cryptography, Codes and Cyber Security: First International Conference, I4CS 2022, Casablanca, Morocco, October 27-28, 2022, Proceedings (Communications in Computer and Information Science)
Quantum Blockchain An Emerging Cryptographic Paradigm
Cryptographic City: Decoding the Smart Metropolis
Discrete Mathematics With Cryptographic Applications A Self-Teaching Introduction
Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers (Lecture Notes in Computer Science Book 13837)
Human Aspects of Information Security and Assurance: 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, … and Communication Technology, 658)
Human Factor in Nuclear Security: Establishing and Optimizing Security Culture (Advanced Sciences and Technologies for Security Applications)
Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions
What Is Computer Science?: An Information Security Perspective (Undergraduate Topics in Computer Science)