Title: Introduction to Certificateless Cryptography / Edition 1, Author: Hu Xiong
Title: How to Cheat at Configuring Open Source Security Tools, Author: Michael Gregg
Title: Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES) / Edition 1, Author: Charles A. Shoniregun
Title: Intelligent Data Analysis for E-Learning: Enhancing Security and Trustworthiness in Online Learning Systems, Author: Jorge Miguel
Title: Scrambling Techniques for CDMA Communications / Edition 1, Author: Byeong Gi Lee
Title: Hacking Exposed Web 2.0 / Edition 1, Author: Himanshu Dwivedi
Title: Geekonomics: The Real Cost of Insecure Software (paperback) / Edition 1, Author: David Rice
Title: Network Control and Engineering for QoS, Security and Mobility II: IFIP TC6 / WG6.2 & WG6.7 Second International Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2003) October 13-15, 2003, Muscat, Oman / Edition 1, Author: Dominique Gaïti
Title: Security Strategies in Linux Platforms and Applications, Author: Michael Jang
Title: Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework / Edition 1, Author: Anne Kohnke
Title: Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings / Edition 1, Author: Pierangela Samarati
Title: Wireless Crime and Forensic Investigation / Edition 1, Author: Gregory Kipper
Title: Cisco Security Professional's Guide to Secure Intrusion Detection Systems, Author: Syngress
Title: Computer Viruses and Malware / Edition 1, Author: John Aycock
Title: Integrating ISA Server 2006 with Microsoft Exchange 2007, Author: Fergus Strachan
Title: WarDriving: Drive, Detect, Defend: A Guide to Wireless Security, Author: Chris Hurley
Title: Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool / Edition 1, Author: Gabriele Giuseppini
Title: Security Informatics and Terrorism: Patrolling the Web: Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web, Author: Cecilia S. Gal
Title: Online Business Security Systems / Edition 1, Author: Godfried B. Williams
Title: Introduction to Network Security: Theory and Practice / Edition 2, Author: Jie Wang

Pagination Links