Title: Mathematical Theory of Advanced Computing, Author: Wolfgang W. Osterhage
Title: Brute Force: Cracking the Data Encryption Standard / Edition 1, Author: Matt Curtin
Title: Citizen Cyborg: Why Democratic Societies Must Respond To The Redesigned Human Of The Future, Author: James Hughes
Title: Anti-Virus Tools and Techniques for Computer, Author: W. Timothy Polk
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1, Author: Dan Farmer
Title: Number Theoretic Methods in Cryptography: Complexity lower bounds / Edition 1, Author: Igor Shparlinski
Title: Foundations of Computer Security / Edition 1, Author: David Salomon
Title: Complexity Theory and Cryptology: An Introduction to Cryptocomplexity / Edition 1, Author: Jörg Rothe
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / Edition 1, Author: Radu Sion
Title: Privacy and Identity Management. Time for a Revolution?: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, Author: David Aspinall
Title: Network Interdiction and Stochastic Integer Programming / Edition 1, Author: David L. Woodruff
Title: Topics in Geometry, Coding Theory and Cryptography / Edition 1, Author: Arnaldo Garcia
Title: Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting / Edition 1, Author: Peter H. Cole
Title: Intrusion Detection in Distributed Systems: An Abstraction-Based Approach / Edition 1, Author: Peng Ning
Title: Public-Key Cryptography / Edition 2, Author: Arto Salomaa
Title: Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns, Author: Clive Blackwell

Pagination Links