Title: Tor and The Dark Net: Remain Anonymous and Evade NSA Spying, Author: James Smith
Title: Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part III, Author: Xingming Sun
Title: Practical Security: Simple Practices for Defending Your Systems, Author: Roman Zabicki
Title: 2600 Magazine: The Hacker Quarterly - Spring 2013, Author: 2600 Magazine
Title: Quality Of Protection: Security Measurements and Metrics, Author: Dieter Gollmann
Title: Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures, Author: Seshagirirao Lekkala
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: System-on-Chip Architectures and Implementations for Private-Key Data Encryption, Author: Máire McLoone
Title: Mastering Mobile Forensics, Author: Soufiane Tahiri
Title: Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition, Author: Allen Harper
Title: Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings, Author: Ming Xu
Title: Data and Applications Security and Privacy XXXV: 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings, Author: Ken Barker
Title: Microsoft 365 Security and Compliance for Administrators: A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture, Author: Sasha Kranjac
Title: Crypto-monnaie Litecoin: Monnaie numérique décentralisée et avenir des transactions financières, Author: Fouad Sabry
Title: Asymmetric Cryptography: Primitives and Protocols, Author: David Pointcheval
Title: Advances in Cryptology - EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III, Author: Yuval Ishai
Title: Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence, Author: Rong Su
Title: Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017. Tips and Signs to Protect your hardaware and software, Author: Ahmed Arifur Rahman
Title: Combating Cyberattacks Targeting the AI Ecosystem: Assessing Threats, Risks, and Vulnerabilities, Author: Aditya Sood
Title: Understanding White-Collar Crime: A Convenience Perspective, Author: Petter Gottschalk

Pagination Links