Items 1 - 15 of 62
1 2 3 4 5
Sort: 

A Practical Guide to Managing Information Security
A Practical Guide to Managing Information Security
By (author): Steve Purser
Published: 31/03/2004
Pages: 280
Advances in Computer System Security, Volume 3
Advances in Computer System Security, Volume 3
By (author): Rein Turn
Published: 31/05/1988
Pages: 376
Attribute-Based Access Control
Attribute-Based Access Control
Published: 01/09/2017
Pages: 280
Authentication Systems for Secure Networks
Authentication Systems for Secure Networks
By (author): Rolf Oppliger
Published: 31/03/1996
Pages: 186
Aviation Security Engineering
Aviation Security Engineering
Published: 31/03/2011
Pages: 356
Biometric Technologies and Applications
Biometric Technologies and Applications
By (author): Shimon Modi
Published: 31/08/2011
Pages: 250
Bitcoin and Blockchain Security
Bitcoin and Blockchain Security
Published: 31/10/2016
Pages: 240
Bluetooth Security
Bluetooth Security
Published: 31/05/2004
Pages: 222
Computer and Intrusion Forensics
Computer and Intrusion Forensics
Published: 31/03/2003
Pages: 420
Computer Forensics and Privacy
Computer Forensics and Privacy
Published: 31/08/2001
Pages: 394
Contemporary Cryptography, Second Edition
Contemporary Cryptography, Second Edition
By (author): Rolf Oppliger
Published: 30/06/2011
Pages: 612
Cryptography for Security & Privacy in Cloud Computing
Cryptography for Security & Privacy in Cloud Computing
By (author)s: Stefan Rass, Daniel Slamanig
Published: 31/10/2013
Pages: 260
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
By (author): Jose Nazario
Published: 31/10/2003
Pages: 318
1 2 3 4 5