Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Group Policy: Fundamentals, Security, and the Managed Desktop / Edition 3, Author: Jeremy Moskowitz
Title: Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition / Edition 2, Author: James M. Adcock
Title: CPTED and Traditional Security Countermeasures: 150 Things You Should Know / Edition 1, Author: Lawrence Fennelly
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Guide to Computer Forensics and Investigations / Edition 6, Author: Bill Nelson
Title: Risk Analysis and Security Countermeasure Selection / Edition 2, Author: Thomas L. Norman CPP/PSP/CSC
Title: Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Sele, Author: Joaquin Garcia-Alfaro
Title: Advances in Cyber Security: Principles, Techniques, and Applications, Author: Kuan-Ching Li
Title: Intrusion Detection, Author: Deborah Frincke
Title: CompTIA Security+ Guide to Network Security Fundamentals / Edition 6, Author: Mark Ciampa
Title: Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings, Author: Guojun Wang
Title: The CISO Handbook: A Practical Guide to Securing Your Company / Edition 1, Author: Michael Gentile
Title: Web Services Research for Emerging Applications: Discoveries and Trends, Author: Liang-Jie Zhang
Title: The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, Author: Peter Y. A. Ryan
Title: Codes and Ciphers: Julius Caesar, the Enigma, and the Internet, Author: R. F. Churchhouse
Title: Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers, Author: Javier Lopez
Title: Botnets: Architectures, Countermeasures, and Challenges / Edition 1, Author: Georgios Kambourakis
Title: Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I, Author: Martin Hirt
Title: Female Offenders and Reentry: Pathways and Barriers to Returning to Society / Edition 1, Author: Lisa M. Carter

Pagination Links