CDD005.82
Redação: General works, books and libraries, information sciences Computing And InformationComputer SoftwareComputer SecurityCryptography and Steganography
Dewmoji: ?????
0 General works, books and libraries, information sciences 216,948 ℹ️ | 1 Philosophy And Psychology 229,419 💭 | 2 Religion 562,779 🙏 | 3 Social Sciences 1,169,921 👫 | 4 Languages and linguistics 177,109 💬 | 5 Mathematics And Science 380,441 🔬 | 6 Applied sciences and technology 844,132 💡 | 7 Fine Arts 857,504 🎨 | 8 Literature 1,201,263 📚 | 9 History and Geography 703,933 🗺️ |
00 Computing And Information 121,406 💻 | 01 Bibliography 22,690 📚 | 02 Library Economy 27,085 📗 | 03 Dictionaries And Encyclopedias 10,798 📕 | 04 General Collections 705 🗃 | 05 General Periodicals 5,183 𝐓 | 06 General Societies; Museums 4,943 🏢 | 07 Journalism And Publishing 15,961 📰 | 08 Anthologies; Quotations 6,034 💬 | 09 Book Rarities 2,143 📜 |
000 -- 837 🌫 | 001 Knowledge 15,776 🦉 | 002 History of the Book 1,368 🔙 | 003 System theory 2,966 💭 | 004 Computer Hardware 26,805 💻 | 005 Computer Software 52,070 💿 | 006 Artificial Intelligence And Internet 21,251 🤓 | 007 -- 78 🤷 | 008 -- 127 🤷 | 009 -- 128 🤷 |
005.0 --- 64 | 005.1 Programming 14,551 ⌨ | 005.2 Programming for Specific Environments 5,826 | 005.3 Programs 3,368 | 005.4 Systems programming and programs 7,013 | 005.5 General purpose application programs 2,029 🖱 | 005.6 Firmware, Microprogramming 34 | 005.7 Data 9,777 🔣 | 005.8 Computer Security 5,207 🔒 | 005.9 --- 4 |
005.80 120 | 005.81 | 005.82 Cryptography and Steganography 486 | 005.83 3 | 005.84 Viruses and Malware 19 | 005.85 | 005.86 Digital Forensics and Disaster Recovery 53 | 005.87 11 | 005.88 4 | 005.89 |
005.820 5 | 005.821 | 005.822 1 | 005.823 1 | 005.824 39 | 005.825 | 005.826 | 005.827 | 005.828 | 005.829 |
Selected Works under MDS 005.82 (486)
- Cryptographic hardware and embedded systems - CHES 2009 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings de Christophe Clavier
- Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings de Willem Jonker
- Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto de Roger A. Grimes
- Advances in cryptology--CRYPTO 2010 30th annual cryptology conference, Santa Barbara, CA, USA, August 15-19, 2010 : proceedings de Tal Rabin
- Advances in security technology : international conference, SecTech 2008, and its special sessions, Sanya, Hainan Island, China, December 13-15, 2008 : revised selected papers de Akingbehin Kiumi
- iOS Forensic Analysis: for iPhone, iPad, and iPod touch (Books for Professionals by Professionals) de Sean Morrissey
- Progress in cryptology--INDOCRYPT 2010 : 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings de Guang Gong
- Cryptology and network security : 8th international conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009 : proceedings de Juan A. Garay
- Selected areas in cryptography : 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, revised selected papers de Michael J. Jacobson
- Advances in cryptology - CRYPTO 2009 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 2009 : proceedings de Shai Halevi
- Information hiding : 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010 : revised selected papers de Rainer Böhme
Related Tags
"Amigos distantes"
As classes CDD com recomendações significativas se sobrepõem, excluindo aquelas na mesma classe de nível superior.
Nenhum(a)
Redação
Edição de 1922 |
Modern Language |
Emoji |