93,23 €
103,59 €
-10% with code: EXTRA
Cryptographic Algorithms
Cryptographic Algorithms
93,23
103,59 €
  • We will send in 10–14 business days.
In today's world the use of paper-based information carriers is decreasing, thanks to the development of information technology it is possible to switch to electronic document management systems. But the more the systems develop and the more the methods of information exchange increase, the more often the threats of electronic documents forgery arise.In order to be able to securely exchange data electronically, it is necessary to apply reliable security methods. These methods include cryptograp…
  • SAVE -10% with code: EXTRA

Cryptographic Algorithms (e-book) (used book) | bookbook.eu

Reviews

Description

In today's world the use of paper-based information carriers is decreasing, thanks to the development of information technology it is possible to switch to electronic document management systems. But the more the systems develop and the more the methods of information exchange increase, the more often the threats of electronic documents forgery arise.In order to be able to securely exchange data electronically, it is necessary to apply reliable security methods. These methods include cryptographic algorithms for electronic signatures, hashing and encryption.

EXTRA 10 % discount with code: EXTRA

93,23
103,59 €
We will send in 10–14 business days.

The promotion ends in 6d.14:40:35

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,04 Book Euros!?

In today's world the use of paper-based information carriers is decreasing, thanks to the development of information technology it is possible to switch to electronic document management systems. But the more the systems develop and the more the methods of information exchange increase, the more often the threats of electronic documents forgery arise.In order to be able to securely exchange data electronically, it is necessary to apply reliable security methods. These methods include cryptographic algorithms for electronic signatures, hashing and encryption.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)