Title: Secure Computers and Networks: Analysis, Design, and Implementation / Edition 1, Author: Eric A. Fisch
Title: Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting / Edition 1, Author: Peter H. Cole
Title: Foundations of Computer Security / Edition 1, Author: David Salomon
Title: Intrusion Detection in Distributed Systems: An Abstraction-Based Approach / Edition 1, Author: Peng Ning
Title: Topics in Geometry, Coding Theory and Cryptography / Edition 1, Author: Arnaldo Garcia
Title: Fifth World Conference on Information Security Education: Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA / Edition 1, Author: Lynn Futcher
Title: Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, Author: Clive Blackwell
Title: Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / Edition 1, Author: Radu Sion
Title: Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers, Author: Mason Rice
Title: Public-Key Cryptography / Edition 2, Author: Arto Salomaa
Title: Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, Author: David Aspinall
Title: Number Theoretic Methods in Cryptography: Complexity lower bounds / Edition 1, Author: Igor Shparlinski
Title: Network Interdiction and Stochastic Integer Programming / Edition 1, Author: David L. Woodruff
Title: Complexity Theory and Cryptology: An Introduction to Cryptocomplexity / Edition 1, Author: Jörg Rothe
Title: Violence in Nigeria: Patterns and Trends, Author: Patricia Taft
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Security Requirements Engineering: Designing Secure Socio-Technical Systems, Author: Fabiano Dalpiaz
Title: Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields, Author: Atsuko Miyaji
Title: Professional Security Management: A Strategic Guide / Edition 1, Author: Charles Swanson
Title: Surveillance and Threat Detection: Prevention versus Mitigation, Author: Richard Kirchner

Pagination Links