Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Computers Under Attack: Intruders, Worms and Viruses, Author: Peter Denning
Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: Public-Key Cryptography: State of the Art and Future Directions: E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991. Final Report, Author: Thomas Beth
Title: The DES : An Extensive Documentation and Evaluation of the Data Encryption Standard, Author: Mikael J. Simovits
Title: Managing Privacy: Information Technology and Corporate America, Author: H. Jeff Smith
Title: Anti-Virus Tools and Techniques for Computer, Author: W. Timothy Polk
Title: Cyberpunk: Outlaws and Hackers on the Computer Frontier, Author: Katie Hafner
Title: The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen, Author: Jonathan Littman
Title: Java Cryptography, Author: Jonathan Knudsen
Explore Series
Title: Java Cryptography, Author: Jonathan Knudsen
Title: E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks, Author: Syngress
Title: Legislating Privacy: Technology, Social Values, and Public Policy, Author: Priscilla M. Regan
Title: Secret Messages: Concealment Codes And Other Types Of Ingenious Communication, Author: William S. Butler
Title: Cyberwarfare: Terror at a Click, Author: John V. Blane
Title: Java Security: Writing and Deploying Secure Applications, Author: Scott Oaks
Title: Malicious Mobile Code: Virus Protection for Windows, Author: Roger A. Grimes
Title: Malicious Mobile Code: Virus Protection for Windows, Author: Roger Grimes
Title: Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios, Author: Mike Schiffman
Title: Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth, Author: Marcia S. Smith

Pagination Links