Title: From Fields To Strings: Circumnavigating Theoretical Physics - Ian Kogan Memorial Collection (In 3 Volumes), Author: Misha Shifman
Title: Wireless Multimedia Communication Systems: Design, Analysis, and Implementation, Author: K.R. Rao
Title: Information Security Management Handbook, Author: Harold F. Tipton
Title: Blockchains: A Handbook on Fundamentals, Platforms and Applications, Author: Sushmita Ruj
Title: Elsevier's Dictionary of Information Security, Author: G. Manoilov
Title: Introduction to Cryptography with Coding Theory, Author: Wade Trappe
Title: Routledge Handbook of Surveillance Studies, Author: Kirstie Ball
Title: Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Author: Brij B. Gupta
Title: Battlefield Forensics for Persian Gulf States: Regional and U.S. Military Weapons, Ammunition, and Headstamp Markings, Author: Don Mikko
Title: Electromagnetic Compatibility: Methods, Analysis, Circuits, and Measurement, Third Edition, Author: David A. Weston
Title: Security and Control in Information Systems: A Guide for Business and Accounting, Author: Andrew Hawker
Title: Introduction to Computer Security / Edition 1, Author: Michael Goodrich
Title: Cryptographic Engineering, Author: Cetin Kaya Koc
Title: Handbook of Multimedia Information Security: Techniques and Applications, Author: Amit Kumar Singh
Title: Visual Cryptography and Secret Image Sharing, Author: Stelvio Cimato
Title: Cyber Security: Law and Guidance, Author: Helen Wong MBE
Title: Defensive Tactics for Today's Law Enforcement, Author: Stephen K. Hayes
Title: Virtuous Policing: Bridging America's Gulf Between Police and Populace, Author: David G. Bolgiano
Title: Practical Core Software Security: A Reference Framework, Author: James F. Ransome
Title: Concepts and Case Studies in Threat Management, Author: Frederick S. Calhoun

Pagination Links