Mostrando 7,901 - 7,920 Resultados de 8,979 Para Buscar 'Ciper~', tiempo de consulta: 1.22s Limitar resultados
  1. 7901
    por Dowland, John, 1563-1626
    Publicado 2013
    Tabla de Contenidos: “…Thomas Collier his galiard (1:26) -- Lachrimae verae (5:11) -- Captaine Digorie Piper his galiard (1:48) -- Semper Dowland semper dolens (5:56) -- The King of Denmarks galiard (1:58) -- Sir Henry Umptons funerall (6:03) -- M. …”
    CDROM
  2. 7902
    Publicado 2005
    Tabla de Contenidos: “…The one, the four and the many Ronald A. Piper; 15. The making of gospel commentaries Markus Bockmuehl…”
    Libro
  3. 7903
    por Viega, John
    Publicado 2002
    Tabla de Contenidos: “…Step 3: SSL Options and Cipher Suites5.1.4.2. Ephemeral keying; 5.1.4.3. Cipher suite selection; 5.1.4.4. …”
    Libro electrónico
  4. 7904
    Publicado 1865
    Consulta i visualització de fragments a Google Llibres
    Libro
  5. 7905
    Publicado 1875
    Libro
  6. 7906
    por Malvestiti, Piero
    Publicado 1960
    Libro
  7. 7907
    Tabla de Contenidos: “…Définition utilisée pour les aciers alliés - Appendix II. Definition used for alloy steels…”
    Libro electrónico
  8. 7908
    Tabla de Contenidos: “…Définition utilisée pour les aciers alliés/Definition used for alloy steels…”
    Libro electrónico
  9. 7909
  10. 7910
  11. 7911
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1. …”
    Libro electrónico
  12. 7912
    Publicado 2010
    “…The Journal is a fully refereed Journal that supports scholarly research and commentary around issues related to the core business of ACHPER. Published three times a year, the Journal disseminates high quality manuscripts from researchers, policy makers and innovators in the fields of health, physical education, sport and recreation…”
    Revista digital
  13. 7913
    por Bernard, Eugène, Abad
    Publicado 1870
    Libro
  14. 7914
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Part 1: Getting Started -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Role of Cryptography in the Connected World -- Evolution of cryptography -- The advent of TLS and the internet -- Increasing connectivity -- Connectivity versus security - larger attack surface -- Connectivity versus marginal attack cost -- Connectivity versus scaling attacks -- Increasing complexity -- Complexity versus security - features -- Complexity versus security - emergent behavior -- Complexity versus security - bugs -- Example attacks -- The Mirai botnet -- Operation Aurora -- The Jeep hack -- Commonalities -- Summary -- Chapter 2: Secure Channel and the CIA Triad -- Technical requirements -- Preliminaries -- Confidentiality -- Integrity -- Authentication -- Message authentication -- Entity authentication -- Secure channels and the CIA triad -- Summary -- Chapter 3: A Secret to Share -- Secret keys and Kerckhoffs's principle -- Cryptographic keys -- One key for each task -- Key change and session keys -- Key space -- Key length -- Crypto-agility and information half-life -- Key establishment -- Key transport -- Key agreement -- Randomness and entropy -- Information-theoretic definition of entropy -- Entropy in cryptography -- True randomness and pseudo-randomness -- Summary -- Chapter 4: Encryption and Decryption -- Preliminaries -- Symmetric cryptosystems -- Information-theoretical security (perfect secrecy) -- A first example -- The one-time pad -- Computational security -- Asymptotic approach and efficient computation -- Negligible probabilities -- Pseudorandomness -- Stream ciphers -- RC4 -- Pseudorandom functions and chosen-plaintext attacks -- Summary -- Chapter 5: Entity Authentication -- The identity concept -- Basic principles of identification protocols -- Basic factors for identification…”
    Libro electrónico
  15. 7915
    Libro
  16. 7916
    por Institute of Medicine (U.S.).
    Publicado 1992
    Tabla de Contenidos:
    Libro electrónico
  17. 7917
  18. 7918
  19. 7919
  20. 7920
    Tabla de Contenidos: “…Douleur me bat -- Plusiers regretz -- Fortune destrange plummaige -- IIe fantazies de Joskin -- O virgo prudentissima -- Domine ne in furore -- Si j'avoye Marion -- Je ne me puis tenir d'aimer -- Allegez moy -- Entré je suis en grant pensée -- Faulte d'argent -- Adieu mes amours : luit -- Adieu mes amours : koor -- Cueurs desolez par toute nation -- A l'eure -- Absolve quaesumus -- Mirabilia testimonia tua…”
    CDROM