Title: The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies, Author: Bloomsbury Academic
Title: Machine Cryptography And Modern Cryptanalysis, Author: Cipher a Deavours
Title: The Right of Privacy in the Computer Age, Author: Warren Freedman
Title: Cryptology, Author: Cipher a Deavours
Title: An Introduction to Cryptology, Author: Henk C.A. van Tilborg
Title: Private Rights, Public Wrongs: The Computer and Personal Privacy, Author: Michael Rogers Rubin
Title: Cryptology, Author: Cipher a Deavours
Title: Elliptic Curve Public Key Cryptosystems / Edition 1, Author: Alfred J. Menezes
Title: Secure Data Networking, Author: Michael Purser
Title: Anti-Virus Tools and Techniques for Computer, Author: W. Timothy Polk
Title: Protecting Business Information: A Manager's Guide / Edition 1, Author: James A Schweitzer
Title: Computer Security / Edition 3, Author: John M. Carroll
Title: Authentication Systems For Secure Networks, Author: Rolf Oppliger Ph.D.
Title: Communications and Multimedia Security II / Edition 1, Author: Patrick Horster
Title: Handbook of Applied Cryptography / Edition 1, Author: Alfred J. Menezes
Title: Chinese Remainder Theorem: Applications In Computing, Coding, Cryptography, Author: Dingyi Pei
Title: Public-Key Cryptography / Edition 2, Author: Arto Salomaa
Title: The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen, Author: Jonathan Littman
Title: Selected Areas in Cryptography / Edition 1, Author: Evangelos Kranakis
Title: Encyclopedia of Cryptology, Author: David E. Newton

Pagination Links