Title: Zero Trust Journey Across the Digital Estate, Author: Abbas Kudrati
Title: X, Y & Z: The Real Story of How Enigma Was Broken, Author: Dermot Turing
Title: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century, Author: Shimon Brathwaite
Title: WCDMA Design Handbook, Author: Andrew Richardson
Title: Wavelet, Subband and Block Transforms in Communications and Multimedia, Author: Ali N. Akansu
Title: Warriors, Author: Kenji Kawano
Title: Vulnerability Analysis and Defense for the Internet, Author: Abhishek Singh
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Visual Content Processing and Representation: 9th International Workshop, VLBV 2005, Sardinia, Italy, September 15-16, 2005, Revised Selected Papers, Author: Luigi Atzori
Title: Visual Content Processing and Representation: 8th International Workshop, VLBV 2003, Madrid, Spain, September 18-19, 2003, Proceedings, Author: Narciso Garcia
Title: Video Encryption Technology and Application, Author: Zhengquan Xu
Title: Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies, Author: Craig P. Bauer
Title: United States Diplomatic Codes and Ciphers, 1775-1938, Author: Ralph E. Weber
Title: Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects, Author: Akira Summers
Title: Understanding and Applying Cryptography and Data Security, Author: Adam J. Elbirt
Title: Ultra at Sea: How Breaking the Nazi Code Affected Allied Naval Strategy During World War II, Author: John Winton
Title: Turing: Pioneer of the Information Age, Author: B. Jack Copeland
Title: Turing's Vision: The Birth of Computer Science, Author: Chris Bernhardt
Title: Turing's Connectionism: An Investigation of Neural Network Architectures, Author: Christof Teuscher
Title: Turing Machines with Sublogarithmic Space, Author: Andrzej Szepietowski

Pagination Links