Items 16 - 30 of 72
1 2 3 4 5
Sort: 

Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
By (author): Edward Humphreys
Published: 29/02/2016
Pages: 224
Information Hiding
Information Hiding
Published: 20/12/2015
Pages: 312
Security for Cloud Computing
Security for Cloud Computing
Published: 30/09/2015
Pages: 184
Secure Messaging on the Internet
Secure Messaging on the Internet
By (author): Rolf Oppliger
Published: 31/07/2014
Pages: 282
Cryptography for Security & Privacy in Cloud Computing
Cryptography for Security & Privacy in Cloud Computing
By (author)s: Stefan Rass, Daniel Slamanig
Published: 31/10/2013
Pages: 260
Engineering Safe and Secure Software Systems
Engineering Safe and Secure Software Systems
By (author): C. Warren Axelrod
Published: 30/11/2012
Pages: 350
Biometric Technologies and Applications
Biometric Technologies and Applications
By (author): Shimon Modi
Published: 31/08/2011
Pages: 250
Aviation Security Engineering:
Aviation Security Engineering:
Published: 31/03/2011
Pages: 356
Identity Management-Concepts, Technologies, and Systems
Identity Management-Concepts, Technologies, and Systems
Published: 30/12/2010
Pages: 194
Enterprise Information Security and Privacy
Enterprise Information Security and Privacy
Published: 28/02/2009
Pages: 260
Homeland Security Technology Challenges:
Homeland Security Technology Challenges:
Published: 30/06/2008
Pages: 314
The Business Privacy Law Handbook
The Business Privacy Law Handbook
By (author): Charles H. Kennedy
Published: 30/04/2008
Pages: 203
Introduction to Identity-Based Encryption
Introduction to Identity-Based Encryption
By (author): Luther Martin
Published: 29/02/2008
Pages: 254
1 2 3 4 5