Title: Secret History: The Story of Cryptology, Author: Craig P. Bauer
Title: Data Protection: Governance, Risk Management, and Compliance, Author: David G. Hill
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Securing the Digital Frontier: Cyber Security for Responsible Citizens and Strategic Thinkers, Author: Andrew Martin
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Enterprise Security Architecture: A Business-Driven Approach, Author: Nicholas Sherwood
Title: Automated Firewall Analytics: Design, Configuration and Optimization, Author: Ehab Al-Shaer
Title: Payment Technologies for E-Commerce, Author: Weidong Kou
Title: The Metrics Manifesto: Confronting Security with Data, Author: Richard Seiersen
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, Author: Kevin D. Mitnick
Title: Cyber Dragon: Inside China's Information Warfare and Cyber Operations, Author: Dean Cheng
Title: Trusted Platform Modules: Why, when and how to use them, Author: Ariel Segall
Title: FinTech: The Technology Driving Disruption in the Financial Services Industry, Author: Parag Y Arjunwadkar
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier
Title: Handbook of Applied Cryptography, Author: Alfred J. Menezes
Title: Disseminating Security Updates at Internet Scale, Author: Jun Li
Title: Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, UK, Author: Ehud Gudes
Title: Data Independence: Reclaiming Privacy in an Era of Evolving Tech, Author: Wes Chaar
Title: Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Author: Pim Tuyls

Pagination Links