Title: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them / Edition 1, Author: David LeBlanc
Title: A Course in Mathematical Cryptography / Edition 1, Author: Gilbert Baumslag
Title: A Guide to Kernel Exploitation: Attacking the Core, Author: Enrico Perla B.Sc.
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: A Practical Guide to Security Engineering and Information Assurance / Edition 1, Author: Debra S. Herrmann
Title: A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET, Author: Iraj Sadegh Amiri
Title: Abstract Algebra: Applications to Galois Theory, Algebraic Geometry, Representation Theory and Cryptography / Edition 2, Author: Celine Carstensen-Opitz
Title: Access Control, Authentication, and Public Key Infrastructure: Print Bundle / Edition 2, Author: Mike Chapple
Title: Advanced Monitoring in P2P Botnets: A Dual Perspective, Author: Shankar Karuppayah
Title: Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies, Author: Ira Winkler
Title: Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, Author: Eric Cole
Title: Advances in Cryptology - ASIACRYPT '96: International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings / Edition 1, Author: Kwangjo Kim
Title: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 / Edition 1, Author: Josef Pawel Pieprzyk
Title: Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings / Edition 1, Author: Mitsuri Matsui
Title: Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II, Author: Tetsu Iwata
Title: Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, Author: Jung Hee Cheon
Title: Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, Author: Jung Hee Cheon
Title: Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, Author: Tsuyoshi Takagi
Title: Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II, Author: Tsuyoshi Takagi
Title: Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III, Author: Tsuyoshi Takagi

Pagination Links