Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Risk Analysis and Security Countermeasure Selection / Edition 2, Author: Thomas L. Norman CPP/PSP/CSC
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition / Edition 2, Author: Thomas R. Peltier
Title: Payment Technologies for E-Commerce / Edition 1, Author: Weidong Kou
Title: Codes and Ciphers: Julius Caesar, the Enigma, and the Internet, Author: R. F. Churchhouse
Title: Enterprise Security Architecture: A Business-Driven Approach / Edition 1, Author: Nicholas Sherwood
Title: Cryptography in C and C++ / Edition 2, Author: Michael Welschenbach
Title: Internet of Things Security: Fundamentals, Techniques and Applications, Author: Shishir K. Shandilya
Title: Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives / Edition 1, Author: Erik Laykin
Title: Computer and Information Security, Author: Audrey Coon
Title: Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival / Edition 1, Author: Brian John Heard
Title: European Axis Signal Intelligence in World War II, Author: National Security Agency
Title: The CISO Handbook: A Practical Guide to Securing Your Company / Edition 1, Author: Michael Gentile
Title: Physics and Theoretical Computer Science: From Numbers and Languages to (Quantum) Cryptography - Volume 7 NATO Security through Science Series: Information and Communication Security, Author: J. P. Gazeau
Title: Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems / Edition 1, Author: Shuangbao Paul Wang
Title: Digital Business Security Development: Management Technologies, Author: Don Kerr
Title: Software Deployment, Updating, and Patching / Edition 1, Author: Bill Stackpole
Title: Mobile Computation with Functions / Edition 1, Author: Zeliha Dilsun Kirli
Title: Computer and Network Security Essentials, Author: Kevin Daimi

Pagination Links