BOOKS - PROGRAMMING - Cryptographic and Information Security Approaches for Images an...
Cryptographic and Information Security Approaches for Images and Videos - S. Ramakrishnan 2018 PDF CRC Press BOOKS PROGRAMMING
ECO~29 kg CO²

3 TON

Views
26657

Telegram
 
Cryptographic and Information Security Approaches for Images and Videos
Author: S. Ramakrishnan
Year: 2018
Format: PDF
File size: 19 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Searching for Health Information: The Cancer Information Service Model (Anniversary Collection)
No Bull Information: A Humorous Practical Guide to Help Americans Adapt to the Information Age
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Information Assurance and Risk Management Strategies Manage Your Information Systems and Tools in the Cloud
Managing Meaning in Ukraine: Information, Communication, and Narration since the Euromaidan Revolution (Information Policy Series)
Advances in Info-Metrics Information and Information Processing across Disciplines
Information Architecture and UX Design The Integration of Information Spaces, Third Edition
Human Information Retrieval (History and Foundations of Information Science)
Entity Information Life Cycle for Big data Master Data Management and Information Integration
Information and Business Performance: A Study of Information Systems and Services in High-Performing Companies (British Library Research Series)
Sustainability in Software Engineering and Business Information Management: Proceedings of the Conference SSEBIM 2022 (Lecture Notes in Information Systems and Organisation)
Information Security and Cryptology - ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, … Papers (Lecture Notes in Computer Science)
Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser
ISO 646-1973 Information technology — ISO 7-bit coded character set for information interchange
Information Sources in Information Technology
Creative Writing and Stylistics, Revised and Expanded Edition: Critical and Creative Approaches (Approaches to Writing)
Information Theory for Beginners: Demystifying Information Theory. A Beginner|s Guide
Information Physics Physics-Information and Quantum Analogies for Complex Systems Modeling
Neural Information Processing: 29th International Conference, ICONIP 2022, Virtual Event, November 22-26, 2022, Proceedings, Part IV (Communications in Computer and Information Science Book 1791)
Hands-on Cryptography with Python Master Cryptographic Foundations with Real-World Implementation for Secure System Development Using Python
Key Digital Trends Shaping the Future of Information and Management Science: Proceedings of 5th International Conference on Information Systems and … (Lecture Notes in Networks and Systems, 671)
CISA - Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems
Disaster Management and Information Technology: Professional Response and Recovery Management in the Age of Disasters (Public Administration and Information Technology Book 40)
Health Information Processing: 8th China Conference, CHIP 2022, Hangzhou, China, October 21-23, 2022, Revised Selected Papers (Communications in Computer and Information Science)
Information Systems Foundations: Theory Building in Information Systems
Information Sources in Metallic Materials (Guides to Information Sources)
Advances in Information Retrieval: 45th European Conference on Information Retrieval, ECIR 2023, Dublin, Ireland, April 2-6, 2023, Proceedings, Part I (Lecture Notes in Computer Science Book 13980)
Automatische Klassifikation Und Information Retrieval: Anwendung Und Entwicklung Komplexer Verfahren in Information-Retrieval-Systemen Und Ihre Evaluierung
Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications … (Lecture Notes in Networks and Systems, 6
Thor|s Microsoft Security Bible A Collection of Practical Security Techniques
Singer|s Security: An MM First Time Bodyguard Romance (Alden Security Book 2)
Social Security Disability Insurance (American Political, Economic, and Security Issues)
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Enhancing IoT Security A holistic approach to security for connected platforms
Agile Application Security Enabling Security in a Continuous Delivery Pipeline
CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Rethinking (In)Security in the European Union: The Migration-Identity-Security Nexus
Enhancing IoT Security A holistic approach to security for connected platforms