Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Meditaciones 170
- Society & social sciences 161
- Biografa 133
- TomÆs de Aquino 132
- Comentarios 124
- Historia 106
- Educación pedagogía 93
- Església Catòlica 91
- Jesucristo- 90
- Obres anteriors al 1800 75
- Biblia 71
- Tratados y manuales 71
- Història 70
- Espiritualidad 58
- Ascetismo 57
- Teología dogmática 54
- Formaciðn 52
- Teologa dogmÆtica- 52
- Crtica e interpretaciðn 50
- Bíblia 43
- Historia / General 43
- Humanities 43
- Litúrgia 41
- Sermones 41
- Teologia 41
- Teologa dogmÆtica 40
- Vida Cristiana 39
- Mara 38
- Teologia moral 35
- Catequesis- 34
-
6381
-
6382
-
6383
-
6384
-
6385
-
6386
-
6387
-
6388
-
6389por Gandhi, Mahatma
Publicado 1981Biblioteca Diocesana Bilbao (Otras Fuentes: Biblioteca Central de Capuchinos de España)Libro -
6390
-
6391
-
6392
-
6393por Haunts, Stephen. author“…What You'll Learn: Get an introduction to the principles of encryption Understand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signatures Combine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiation Use Microsoft's Azure Key Vault to securely store encryption keys and secrets Build real-world code to use in your own projects This book is for software developers with experience in .NET and C#. …”
Publicado 2019
Libro electrónico -
6394Publicado 2019“…We start by exploring the basics of symmetric encryption algorithms such as AES, asymmetric encryption (RSA), and hashing protocols (MD5 and SHA). …”
-
6395Publicado 2020“…Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation)…”
Libro electrónico -
6396
-
6397
-
6398
-
6399
-
6400