1- 20 of 228 results
Title: A Practical Guide To Managing Information Security / Edition 1, Author: Steve Purser
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia / Edition 1, Author: Borka Jerman-Blazic
Title: Advanced Monitoring in P2P Botnets: A Dual Perspective, Author: Shankar Karuppayah
Title: Advanced Security Technologies in Networking, Author: Borka Jerman Blazie
Title: Advances In Artificial Intelligence For Privacy Protection And Security, Author: Agusti Solanas
Title: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008 / Edition 1, Author: Josef Pawel Pieprzyk
Title: Advances in Cyber Security: Principles, Techniques, and Applications, Author: Kuan-Ching Li
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Analysis, Design and Implementation of Secure and Interoperable Distributed Health Information Systems, Author: Bernd Blobel
Title: Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings, Author: V. S. Shankar Sriram
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Applied Quantum Cryptography / Edition 1, Author: Christian Kollmitzer
Title: Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings / Edition 1, Author: Jerzy Soldek
Title: At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, Author: National Research Council
Title: Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans / Edition 1, Author: Yusufali F. Musaji
Title: Battlefield Forensics for Persian Gulf States: Regional and U.S. Military Weapons, Ammunition, and Headstamp Markings / Edition 1, Author: Don Mikko
Title: Beautiful Security: Leading Security Experts Explain How They Think / Edition 1, Author: Andy Oram
Title: Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science / Edition 1, Author: Wayne Patterson
Title: Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging, Author: Darren Quick

Pagination Links