Title: Group Policy: Fundamentals, Security, and the Managed Desktop / Edition 3, Author: Jeremy Moskowitz
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition / Edition 2, Author: James M. Adcock
Title: CPTED and Traditional Security Countermeasures: 150 Things You Should Know / Edition 1, Author: Lawrence Fennelly
Title: Guide to Computer Forensics and Investigations / Edition 6, Author: Bill Nelson
Title: Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals, Author: James C Foster
Title: Transactions on Data Hiding and Multimedia Security III / Edition 1, Author: Yun Q. Shi
Title: Financial Cryptography and Data Security: FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers, Author: Michael Brenner
Title: Information Security Applications: 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers, Author: Brent ByungHoon Kang
Title: Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Sele, Author: Joaquin Garcia-Alfaro
Title: Female Offenders and Reentry: Pathways and Barriers to Returning to Society / Edition 1, Author: Lisa M. Carter
Title: Community Policing in Indigenous Communities / Edition 1, Author: Mahesh K. Nalla
Title: Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings / Edition 1, Author: Mark Lomas
Title: Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, Author: Frank Piessens
Title: Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings / Edition 1, Author: Yun Qing Shi
Title: Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers / Edition 1, Author: Kaisa Nyberg
Title: Frontiers in Cyber Security: Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings, Author: Bazhong Shen
Title: Design of Hashing Algorithms / Edition 1, Author: Josef Pieprzyk
Title: Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers / Edition 1, Author: Levente Buttyan
Title: Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings / Edition 1, Author: Hideki Imai
Title: Privacy, Security, and Trust in KDD: First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papers, Author: Francesco Bonchi

Pagination Links