Title: Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century / Edition 1, Author: Ryan Trost
Title: Wireless Network Security / Edition 1, Author: Yang Xiao
Title: Socioeconomic and Legal Implications of Electronic Intrusion, Author: Dionysios Politis
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: Managing Cyber Risk in the Financial Sector: Lessons from Asia, Europe and the USA / Edition 1, Author: Ruth Taplin
Title: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication / Edition 1, Author: Andreas Uhl
Title: Protocols for Secure Electronic Commerce / Edition 3, Author: Mostafa Hashem Sherif
Title: Security in Communication Networks: 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers / Edition 1, Author: Carlo Blundo
Title: Wireless Networks: Multiuser Detection in Cross-Layer Design / Edition 1, Author: Christina Comaniciu
Title: Guide to Firewalls and Network Security / Edition 2, Author: Michael E. Whitman
Title: Introduction to Computer Networks and Cybersecurity / Edition 1, Author: Chwan-Hwa (John) Wu
Title: Network Control and Engineering for QoS, Security and Mobility II: IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13-15, 2003, Muscat, Oman / Edition 1, Author: Dominique Gaïti
Title: Security in Ad-hoc and Sensor Networks: First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers / Edition 1, Author: Claude Castelluccia
Title: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices: International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers / Edition 1, Author: Gilles Barthe
Title: Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Author: Jason Sachowski
Title: Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers / Edition 1, Author: George Danezis
Title: Mechanics of User Identification and Authentication: Fundamentals of Identity Management / Edition 1, Author: Dobromir Todorov
Title: How to Cheat at Deploying and Securing RFID, Author: Frank Thornton
Title: Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code, Author: Michael Erbschloe
Title: The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web / Edition 1, Author: Ron Lepofsky

Pagination Links