Title: Secure Computers and Networks: Analysis, Design, and Implementation / Edition 1, Author: Eric A. Fisch
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Topics in Geometry, Coding Theory and Cryptography / Edition 1, Author: Arnaldo Garcia
Title: Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, Author: David Aspinall
Title: Complexity Theory and Cryptology: An Introduction to Cryptocomplexity / Edition 1, Author: Jörg Rothe
Title: Intrusion Detection in Distributed Systems: An Abstraction-Based Approach / Edition 1, Author: Peng Ning
Title: Network Interdiction and Stochastic Integer Programming / Edition 1, Author: David L. Woodruff
Title: Public-Key Cryptography / Edition 2, Author: Arto Salomaa
Title: Number Theoretic Methods in Cryptography: Complexity lower bounds / Edition 1, Author: Igor Shparlinski
Title: Foundations of Computer Security / Edition 1, Author: David Salomon
Title: Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / Edition 1, Author: Radu Sion
Title: Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting / Edition 1, Author: Peter H. Cole
Title: Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, Author: Clive Blackwell
Title: Professional Security Management: A Strategic Guide / Edition 1, Author: Charles Swanson
Title: Surveillance and Threat Detection: Prevention versus Mitigation, Author: Richard Kirchner
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Case Study of Security Problems and Their Solutions / Edition 1, Author: Gunner O. Klein
Title: Cybercrime and Business: Strategies for Global Corporate Security, Author: Sanford Moskowitz
Title: Algebraic Geometry in Coding Theory and Cryptography, Author: Harald Niederreiter
Title: A History of Cyber Security Attacks: 1980 to Present / Edition 1, Author: Bruce Middleton

Pagination Links