1- 20 of 228 results
Title: Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework / Edition 1, Author: Jessey Bullock
Title: Web Services Research for Emerging Applications: Discoveries and Trends, Author: Liang-Jie Zhang
Title: Verification of Infinite-State Systems with Applications to Security: Volume 1 NATO Security through Science Series: Information and Communication Security, Author: M. Minea
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams / Edition 1, Author: Wil Allsopp
Title: Trust Management and Information Security, Author: Stephen Mason
Title: Trust in Social Media / Edition 1, Author: Jiliang Tang
Title: Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers / Edition 1, Author: Bryan Jeffrey Parno
Title: Trends in the Judiciary: Interviews with Judges Across the Globe, Volume Two / Edition 1, Author: David Lowe
Title: Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five / Edition 1, Author: Bruce F. Baker
Title: Trends in Corrections: Interviews with Corrections Leaders Around the World, Volume Two / Edition 1, Author: Martha Henderson Hurley
Title: Transactions on Data Hiding and Multimedia Security III / Edition 1, Author: Yun Q. Shi
Title: Transactions on Computational Science XXVI: Special Issue on Cyberworlds and Cybersecurity, Author: Marina L. Gavrilova
Title: Topics in Geometry, Coding Theory and Cryptography / Edition 1, Author: Arnaldo Garcia
Title: Theory of Quantum Computation, Communication, and Cryptography: Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008, Revised Selected Papers / Edition 1, Author: Yasuhito Kawano
Title: Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II, Author: Martin Hirt
Title: Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I, Author: Martin Hirt
Title: The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, Author: Peter Y. A. Ryan
Title: The Hash Function BLAKE, Author: Jean-Philippe Aumasson
Title: The Death of the Internet / Edition 1, Author: Markus Jakobsson
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke

Pagination Links