Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Quantum Information Theory / Edition 2, Author: Mark M. Wilde
Title: Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD, Author: Ryan Russell
Title: Secure Multiparty Computation and Secret Sharing, Author: Ronald Cramer
Title: Data Protection: Governance, Risk Management, and Compliance / Edition 1, Author: David G. Hill
Title: Secret History: The Story of Cryptology / Edition 1, Author: Craig P. Bauer
Title: The Complete Guide to Cybersecurity Risks and Controls / Edition 1, Author: Anne Kohnke
Title: Cybersecurity Law / Edition 2, Author: Jeff Kosseff
Title: Post-Quantum Cryptography / Edition 1, Author: Daniel J. Bernstein
Title: Cryptography: Theory and Practice / Edition 4, Author: Douglas Robert Stinson
Title: Managing an Information Security and Privacy Awareness and Training Program / Edition 2, Author: Rebecca Herold
Title: Informants, Cooperating Witnesses, and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure, Second Edition / Edition 2, Author: Dennis G. Fitzgerald
Title: Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans / Edition 1, Author: Yusufali F. Musaji
Title: Assessing and Managing Security Risk in IT Systems: A Structured Methodology / Edition 1, Author: John McCumber
Title: Intelligent Multimedia Data Analysis / Edition 1, Author: Siddhartha Bhattacharyya
Title: Foundations of Secure Computation / Edition 1, Author: R. Steinbrueggen
Title: Optical and Digital Techniques for Information Security / Edition 1, Author: Bahram Javidi
Title: Intrusion Detection Systems / Edition 1, Author: Roberto Di Pietro
Title: Fundamentals of Secure System Modelling, Author: Raimundas Matulevicius
Title: Information Security Policies, Procedures, and Standards: A Practitioner's Reference / Edition 1, Author: Douglas J. Landoll

Pagination Links