Title: 21st Century Prometheus: Managing CBRN Safety and Security Affected by Cutting-Edge Technologies, Author: Maurizio Martellini
Title: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, Author: David LeBlanc
Title: 70 Tips and Tricks for Mastering the CISSP Exam, Author: R. Sarma Danturthi
Title: A Classical Introduction to Cryptography: Applications for Communications Security, Author: Serge Vaudenay
Title: A Course in Mathematical Cryptography, Author: Gilbert Baumslag
Title: A Cybersecurity Leader's Journey: Speaking the Language of the Board, Author: Edward Marchewka
Title: A European Perspective on Crisis Informatics: Citizens' and Authorities' Attitudes Towards Social Media for Public Safety and Security, Author: Christian Reuter
Title: A Pathology of Computer Viruses, Author: David Ferbrache
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: A Survey of Data Leakage Detection and Prevention Solutions, Author: Asaf Shabtai
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Access Control, Security, and Trust: A Logical Approach, Author: Shiu-Kai Chin
Title: Achieving Systems Safety: Proceedings of the Twentieth Safety-Critical Systems Symposium, Bristol, UK, 7-9th February 2012, Author: Chris Dale
Title: Active Directory Administration Cookbook, Author: Sander Berkouwer
Title: Adaptive Autonomous Secure Cyber Systems, Author: Sushil Jajodia
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic
Title: Advanced Concepts for Intelligent Vision Systems: 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings, Author: Sebastiano Battiato
Title: Advanced Cybersecurity Technologies, Author: Ralph Moseley
Title: Advanced Monitoring in P2P Botnets: A Dual Perspective, Author: Shankar Karuppayah

Pagination Links