BOOKS - PROGRAMMING - Cryptographic and Information Security Approaches for Images an...
Cryptographic and Information Security Approaches for Images and Videos - S. Ramakrishnan 2018 PDF CRC Press BOOKS PROGRAMMING
ECO~29 kg CO²

3 TON

Views
26661

Telegram
 
Cryptographic and Information Security Approaches for Images and Videos
Author: S. Ramakrishnan
Year: 2018
Format: PDF
File size: 19 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Liquefied Natural Gas: Security and Hazards: Security and Hazards
In the Approaches
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Approaches to Homer
Eastern Approaches
New Approaches to Ezra Pound
Approaches to the History of Spain
Approaches to Predicative Possession
Debating New Approaches to History
Kendo Approaches For All Levels
Red Stone Security Series Box Set: Volume 1 (Red Stone Security, #1-3)
Classical Approaches to the Study of Religion
Tourism Imaginaries: Anthropological Approaches
Creative Approaches to Photographing People
Approaches to Paradise Lost (Heritage)
Experimental Approaches to Conservation Biology
Software Engineering Modern Approaches
New Approaches to Greek and Roman Warfare
Surgical Approaches to Facial Skeleton, 3E
Modern Approaches in Machine Learning v.4
Approaches to Measuring Linguistic Differences
New Approaches to Latin American History
Approaches to Positive Youth Development
Dynamic Epigraphy: New Approaches to Inscriptions
Computer Graphics in Mathematical Approaches
Approaches: Drugs and Altered States
Environmentally Benign Approaches for Pulp
Intercultural Theology: Approaches and Themes
The Statue of Zeus at Olympia: New Approaches
Green Approaches in Medicinal Chemistry
Jurisdiction (Critical Approaches to Law)
Approaches to Cross-Cultural Psychiatry
Functional and Systemic Linguistics: Approaches and Uses
Design Culture: Objects and Approaches
Multiscale Modeling Approaches for Composites
New Approaches to Hedging (Studies in Pragmatics, 9)
Quentin Security Series, Volume Two (Quentin Security #4-6)
Edge Security Box Set (Edge Security #3.5-5)
A Shepherd Security Christmas: Shepherd Security Book #14.5
Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments