Mostrando 8,021 - 8,040 Resultados de 8,979 Para Buscar 'Ciper~', tiempo de consulta: 1.41s Limitar resultados
  1. 8021
    Publicado 2018
    Tabla de Contenidos: “…Making rights in times of crisis: civil society and the Migrant Workers Convention / Lisa Simeone and Nicola Piper. Part II. The ICRMW in international human rights law. 3. …”
    Libro electrónico
  2. 8022
    Publicado 2009
    Tabla de Contenidos: “…Memory Along Life’s Genesis -- Memory and The Myth of Prometheus -- A History of The Idea of Organic Memory -- Memory and Action: The Conscience of Time in Personal Becoming in Bergson and Blondel -- Phenomenology of Life on Memory: Revealing The Creative Human Condition in The Music Art Universe -- Humanizing Nature -- The Anthropocentric Versus Biocentric Outlook on Nature -- Ecological Design And Retrieving The Environmental Meaning -- Philosophical-Historical Aspects Of Land Relations (On Example Of Russian North Nations) -- The Phenomenon of The Gaze -- Ciphering Human Existence -- Kierkegaard And The Phenomenology Of Repetition In The Nouveau Roman -- Notion Of Forgetting And Remembering In Piranesi: Fireplace As The Setting Of A Dionysian Play -- The Category Of The “NOW” In Husserlian Phenomenology Of Time—Polemic Against Derridean Anti-Presentialism -- “Smritir Bhumika” (The Role of Memory): Some Memory-Related Poems and Songs of Rabindranath -- Memory As a Challenge to Human Existence – Aspects Of Temporality And The Role Of Memory In Reference To Guitton’S Concept Of Time -- Time, Memory And The Musical Perception -- Play Of Memory In Self-Identity Otherness -- Memory, Personal Identity, and Moral Responsibility -- Memory As a Positive and Negative Motivation Component In a Person’s Activity -- “Interpreting” The Modern Times – Possibilities, Limitations, Social And Vital Functions -- The Activity Of The Self-Realization Within The Context Of The Fabricated Identity Of The Consumer Self And Its Transformation -- Utilitarian-Aesthetic Dynamics of Nature -- Memory In The Creative Ontopoiesis Of Life -- Memory and Creativity in The Context of Ontopoiesis of Beingness: A-T. …”
    Libro electrónico
  3. 8023
    Publicado 2007
    Tabla de Contenidos: “…Mobility -- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks -- A New Resilient Key Management Protocol for Wireless Sensor Networks -- Hardware and Cryptography I -- Efficient Use of Random Delays in Embedded Software -- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding -- Privacy -- Securing the Distribution and Storage of Secrets with Trusted Platform Modules -- Distributed Certified Information Access for Mobile Devices -- Cryptography Scheme -- Linkability of Some Blind Signature Schemes -- Optimistic Non-repudiation Protocol Analysis -- Secure Remote User Authentication Scheme Using Bilinear Pairings -- Cryptanalysis of Some Proxy Signature Schemes Without Certificates -- Smart Card -- Performance Evaluation of Java Card Bytecodes -- Reverse Engineering Java Card Applets Using Power Analysis -- An Embedded System for Practical Security Analysis of Contactless Smartcards -- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies -- Small Devices -- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication -- An Information Flow Verifier for Small Embedded Systems -- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks -- Hardware and Cryptography II -- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures -- CRT RSA Algorithm Protected Against Fault Attacks -- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks…”
    Libro electrónico
  4. 8024
    Publicado 2021
    Tabla de Contenidos: “…Augustine the theologian and polemicist 17. Cineres extinsti dogmatis refouendo ? : "Pelagianism" in the christian sources from 431 to the carolingian period 18. …”
    Libro
  5. 8025
    Publicado 1961
    Libro
  6. 8026
  7. 8027
    Publicado 2017
    Tabla de Contenidos: “…Review QuestionsChapter 3 Encryption Ciphers and Methods; Encryption Basics; Symmetric and Asymmetric Algorithms; Stream and Block Ciphers; RC4/ARC4; RC5; DES; 3DES; AES; WLAN Encryption Methods; WEP; WEP MPDU; TKIP; TKIP MPDU; CCMP; CCMP MPDU; WPA/WPA2; Future Encryption Methods; Proprietary Layer 2 Implementations; Summary; Exam Essentials; Review Questions; Chapter 4 802.1X/EAP Authentication; WLAN Authentication Overview; AAA; Authentication; Authorization; Accounting; 802.1X; Supplicant; Authenticator; Authentication Server; Supplicant Credentials; Usernames and Passwords…”
    Libro electrónico
  8. 8028
    Publicado 1980
    Revista digital
  9. 8029
    Publicado 2024
    “….), former Commander of the Joint Special Operations Command; and John Cipher, former member of the CIA's Senior Intelligence Service. …”
    Grabación no musical
  10. 8030
    por Verdi, Giuseppe, 1813-1901
    Publicado 2003
    Materias: “…Cine musical…”
    Libreto
    DVD
  11. 8031
    por Trevor-Roper, H. R., 1914-2003
    Publicado 2014
    Materias: “…Trevor-Roper, H. R. 1914-2003 Diarios personales…”
    Libro
  12. 8032
    Publicado 2022
    “…Subtil, mutig und mit feinem Gefühl für die Sprache erzählt Lin Hierse in „Wovon wir träumen“ von einer Beziehung zwischen Mutter und Tochter und den Fragen nach Identität, Nähe und Abgrenzung. …”
    Libro
  13. 8033
    Publicado 2005
    Tabla de Contenidos: “…Garriere Cedro del AtlasChamaecyparis lawsoniana (A. Murr.) Parl. Ciprés de Lawson; Cupressus arizonica Greene Ciprés de Arizona; Larix decidua Mill. …”
    Libro electrónico
  14. 8034
    Publicado 1995
    Tabla de Contenidos: “…The continuum of translation as seen in three Middle French treatises on comets / Lys Ann Shore -- Vernacular translation in the fourteenth-century crown of Aragon : Brunetto Latini's Li livres dou tresor / Dawn Ellen Prince -- Patronage and the translator : Raoul de Presles's La cité de Dieu and Calvin's Institution de la religion chrestienne and Institutio religionis Christianae / Jeanette Beer -- Marot's Le roman de la rose and evangelical poetics / Hope H. …”
    Libro
  15. 8035
    por Baratella, Antonio
    Publicado 1401
    Tabla de Contenidos: “…Anthonius Baratella Ad musas lugubres super obitu Francisci Buschi poete mantuani hic in Baratella (h . 1 v.) . …”
    Manuscrito
  16. 8036
    Publicado 2023
    Tabla de Contenidos: “…8.1.1 Different Types of Cryptography -- 8.1.1.1 Symmetric Key Cryptography -- 8.1.1.2 Asymmetric Key Cryptography -- 8.1.1.3 Hash Functions -- 8.1.2 Cryptographic Schemes -- 8.1.2.1 Simple Substitution Cipher -- 8.1.2.2 Caesar Cipher -- 8.1.2.3 Vigenère Cipher -- 8.1.2.4 Transposition Cipher -- 8.2 Playfair Cipher -- 8.2.1 Encryption Algorithm -- 8.2.1.1 Step 1 - Generate Squares (5 * 5) -- 8.2.1.2 Step 2 - Algorithm to Encrypt Plaintext -- 8.2.2 Decryption Algorithm -- 8.2.2.1 Step 1 - Generate Squares (5 * 5) -- 8.2.2.2 Step 2 - Algorithm to Decrypt the Ciphertext -- 8.2.3 Advantages and Disadvantages -- 8.2.3.1 Advantages -- 8.2.3.2 Disadvantages -- 8.3 Hill Cipher -- 8.3.1 Substitution Scheme -- 8.3.1.1 Encryption -- 8.3.1.2 Decryption -- 8.4 RSA Algorithm in Cryptography -- 8.4.1 Working Mechanism -- 8.4.1.1 Generating the Public Key -- 8.4.1.2 Generating a Private Key -- 8.5 Multiple Precision Arithmetic Library -- 8.5.1 GNU Multiple Precision Arithmetic Library -- 8.5.2 RSA Algorithm Implementation Using GMP Library -- 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem -- 8.6 SHA-512 Hash in Java -- 8.7 Cybersecurity -- 8.7.1 Common Cyberattacks -- 8.7.1.1 Denial-of-Service Attacks -- 8.7.1.2 Malware -- 8.7.1.3 Man-in-the-Middle Attack -- 8.7.1.4 Phishing -- 8.7.1.5 Structured Language Query Injection -- 8.7.1.6 Latest Cyberthreats -- 8.7.2 Key Cybersecurity Features -- 8.7.3 Blockchain for Cybersecurity -- 8.7.4 Pros and Cons of Blockchain in Cybersecurity -- 8.7.4.1 Pros -- 8.7.4.2 Cons -- 8.7.5 Real-world Examples -- 8.7.5.1 Australian Government -- 8.7.5.2 Barclays -- 8.7.5.3 Chinese Military -- 8.7.5.4 Cisco -- 8.7.5.5 Coinbase -- 8.7.5.6 Colorado State -- 8.7.5.7 Founders Bank -- 8.7.5.8 Health Linkage -- 8.7.5.9 JP Morgan -- 8.7.5.10 Mobile Coin -- 8.7.5.11 Philips Healthcare -- 8.7.5.12 Santander Bank -- 8.7.5.13 Wall Street…”
    Libro electrónico
  17. 8037
    por Caputo, John D.
    Publicado 2014
    Tabla de Contenidos: “…LA POÉTICA DE LO IMPO -- 6. HIPER-REALISMO Y LA HERMENÉUTICA DE LA EXHORTACI -- SEGUNDA PARTE: EL REINO DE DIOS ESBOZOS DE UNA SAGRADA ANARQUÍA -- 7. …”
    Libro electrónico
  18. 8038
    Publicado 2020
    Tabla de Contenidos: “…Terroir and farm workers in North American craft cider / Anelyse Weiler -- The potential role of geographical indication in supporting indigenous communities in Canada / Donna Appavoo and Monika Korzun -- Conclusions : comprehensive change and the limits and power of sectorial measures / Alessandro Bonanno, Kae Sekine and Hart N. …”
    Libro electrónico
  19. 8039
    Publicado 2013
    Tabla de Contenidos: “…Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer SecurityChapter 24 - Virtual Private Networks for Network Layer Security; Chapter 25 - Network Access Control and Wireless Network Security; Chapter 26 - Cyber Threats and Their Defense; Chapter 27 - Network and Information Infrastructure Virtualization; Chapter 28 - Unified Communications and Multimedia Protocols; Glossary of Acronyms; Back Cover…”
    Libro electrónico
  20. 8040
    Publicado 2017
    Tabla de Contenidos: “…From subsistence to nutrition : the Canadian state's involvement in food and diet in the north, 1900-1970 / Liza Piper -- 7. Hope in the barrenlands : northern development and sustainability's Canadian history / Tina Loo -- 8. …”
    Libro electrónico