Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: The Complete Guide to Cybersecurity Risks and Controls / Edition 1, Author: Anne Kohnke
Title: Cryptography: Theory and Practice / Edition 4, Author: Douglas Robert Stinson
Title: Quantum Information Theory / Edition 2, Author: Mark M. Wilde
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Managing an Information Security and Privacy Awareness and Training Program / Edition 2, Author: Rebecca Herold
Title: Informants, Cooperating Witnesses, and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure, Second Edition / Edition 2, Author: Dennis G. Fitzgerald
Title: Elliptic Curves: Number Theory and Cryptography, Second Edition / Edition 2, Author: Lawrence C. Washington
Title: IP Address Management: Principles and Practice / Edition 1, Author: Timothy Rooney
Title: Cybersecurity Law / Edition 2, Author: Jeff Kosseff
Hardcover from $95.47 $122.75 Current price is $95.47, Original price is $122.75.
Title: Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans / Edition 1, Author: Yusufali F. Musaji
Title: Cyber Security Policy Guidebook / Edition 1, Author: Jennifer L. Bayuk
Title: Secure Computer and Network Systems: Modeling, Analysis and Design / Edition 1, Author: Nong Ye
Title: Kish Cypher, The: The Story Of Kljn For Unconditional Security, Author: Laszlo B Kish
Title: Mathematical Theory of Advanced Computing, Author: Wolfgang W. Osterhage
Title: Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits / Edition 1, Author: Eric Peeters
Title: Enterprise Information Security and Privacy, Author: C. Warren Axelrod

Pagination Links