Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: Graph Theory, Coding Theory and Block Designs, Author: P. J. Cameron
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Quasi-symmetric Designs, Author: Mohan S. Shrikhande
Title: Public-Key Cryptography: State of the Art and Future Directions: E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991. Final Report, Author: Thomas Beth
Title: A Classical Introduction to Cryptography Exercise Book, Author: Thomas Baigneres
Title: Practical Hadoop Security, Author: Bhushan Lakhe
Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: What Is Computer Science?: An Information Security Perspective, Author: Daniel Page
Title: Practical Forensic Imaging: Securing Digital Evidence with Linux Tools, Author: Bruce Nikkel
Title: A Classical Introduction to Cryptography Exercise Book, Author: Thomas Baigneres
Title: Information and Coding Theory / Edition 1, Author: Gareth A. Jones
Title: Practical Hadoop Security / Edition 1, Author: Bhushan Lakhe
Title: E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings, Author: James Heather
Title: Secret Key Cryptography: Ciphers, from simple to unbreakable, Author: Frank Rubin
Title: Alan M. Turing: Centenary Edition, Author: Sara Turing
Title: Models of Computation: An Introduction to Computability Theory / Edition 1, Author: Maribel Fernandez
Title: Group-based Cryptography, Author: Alexei Myasnikov

Pagination Links