1- 20 of 113 results
Title: Advanced Monitoring in P2P Botnets: A Dual Perspective, Author: Shankar Karuppayah
Title: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 / Edition 1, Author: Josef Pawel Pieprzyk
Title: Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, Author: Rosario Gennaro
Title: Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II, Author: Rosario Gennaro
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings, Author: V. S. Shankar Sriram
Title: At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, Author: National Research Council
Title: Battlefield Forensics for Persian Gulf States: Regional and U.S. Military Weapons, Ammunition, and Headstamp Markings / Edition 1, Author: Don Mikko
Title: Beautiful Security: Leading Security Experts Explain How They Think / Edition 1, Author: Andy Oram
Title: Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging, Author: Darren Quick
Title: Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence, Author: Darren Quick
Title: Black Hat: Misfits, Criminals, and Scammers in the Internet Age / Edition 1, Author: DUP John Biggs
Title: CASP+ Practice Tests: Exam CAS-003 / Edition 1, Author: Nadean H. Tanner
Title: Codes and Ciphers: Julius Caesar, the Enigma, and the Internet / Edition 1, Author: R. F. Churchhouse
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition / Edition 2, Author: James M. Adcock
Title: Community Policing in Indigenous Communities / Edition 1, Author: Mahesh K. Nalla
Title: Complexity and Cryptography: An Introduction / Edition 1, Author: John Talbot
Title: CompTIA Security+ Guide to Network Security Fundamentals / Edition 6, Author: Mark Ciampa
Title: CompTIA Security+ Guide to Network Security Fundamentals, Lab Manual / Edition 6, Author: Andrew Hurd
Title: Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings, Author: Geetha Ganapathi

Pagination Links