Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia / Edition 1, Author: Borka Jerman-Blazic
Title: Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / Edition 1, Author: Jonathan Katz
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C / Edition 2, Author: Bruce Schneier
Paperback from $34.06 $60.00 Current price is $34.06, Original price is $60.00.
Title: Chaotic Secure Communication: Principles and Technologies, Author: Kehui Sun
Title: Chaotic Secure Communication: Principles and Technologies / Edition 1, Author: Kehui Sun
Title: Communication System Security, Author: Lidong Chen
Title: Communications and Multimedia Security II / Edition 1, Author: Patrick Horster
Title: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / Edition 1, Author: Antonio Lioy
Title: Communications and Multimedia Security: 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / Edition 1, Author: Herbert Leitold
Title: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom / Edition 1, Author: David Chadwick
Title: Communications and Multimedia Security: 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings / Edition 1, Author: Jana Dittmann
Title: Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century / Edition 1, Author: Aiden A. Bruen
Title: Cyber Insecurity: Navigating the Perils of the Next Information Age, Author: Richard Harrison
Title: Cyber Insecurity: Navigating the Perils of the Next Information Age, Author: Richard Harrison
Title: Disaster Recovery Planning for Communic, Author: Leo A Wrobel
Title: Disaster Recovery Planning for Nonprofits, Author: Michael K. Robinson
Title: Disaster Recovery Planning For Telecommunications, Author: Leo A. Wrobel
Title: Embedded Cryptographic Hardware: Methodologies and Architectures, Author: Nadia Nedjah

Pagination Links