Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Computers Under Attack: Intruders, Worms and Viruses, Author: Peter Denning
Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: Public-Key Cryptography: State of the Art and Future Directions: E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991. Final Report, Author: Thomas Beth
Title: The DES : An Extensive Documentation and Evaluation of the Data Encryption Standard, Author: Mikael J. Simovits
Title: Managing Privacy: Information Technology and Corporate America, Author: H. Jeff Smith
Title: Cyberpunk: Outlaws and Hackers on the Computer Frontier, Author: Katie Hafner
Title: Java Cryptography, Author: Jonathan Knudsen
Title: Cyberwarfare: Terror at a Click, Author: John V. Blane
Title: Malicious Mobile Code: Virus Protection for Windows, Author: Roger Grimes
Title: Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios, Author: Mike Schiffman
Title: Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth, Author: Marcia S. Smith
Title: Secrets of Computer Espionage: Tactics and Countermeasures / Edition 1, Author: Joel McNamara
Title: PDA Security, Author: David Melnick
Title: Cryptography For Dummies, Author: Chey Cobb
Title: Java Cryptography Extensions, Author: Jason R. Weiss
Title: Hardening Windows Systems, Author: Roberta Bragg
Title: Managing Security with Snort & IDS Tools: Intrusion Detection with Open Source Tools, Author: Kerry Cox
Title: Computer Forensics JumpStart, Author: Michael G. Solomon
Title: Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives, Author: Eric Cole

Pagination Links