Title: Protocols for Secure Electronic Commerce / Edition 2, Author: Mostafa Hashem Sherif
Title: Attribute-Based Encryption and Access Control / Edition 1, Author: Dijiang Huang
Title: Cryptographic Solutions for Secure Online Banking and Commerce, Author: Kannan Balasubramanian
Title: Wireless Security and Cryptography: Specifications and Implementations / Edition 1, Author: Nicolas Sklavos
Title: Iris Biometric Model for Secured Network Access, Author: Franjieh El Khoury
Title: Information Theft Prevention: Theory and Practice / Edition 1, Author: Romanus Okeke
Title: Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity, Author: Reza Montasari
Title: Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence, Author: ElMouatez Billah Karbab
Title: Handbook of Big Data Analytics and Forensics, Author: Kim-Kwang Raymond Choo
Title: Privacy, Security And Forensics in The Internet of Things (IoT), Author: Reza Montasari
Title: Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity, Author: Reza Montasari
Title: Handbook of Big Data Analytics and Forensics, Author: Kim-Kwang Raymond Choo
Title: Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence, Author: ElMouatez Billah Karbab
Title: New Telecom Networks: Enterprises and Security / Edition 1, Author: Daniel Battu
Title: Online Consumer Protection: Theories of Human Relativism, Author: Kuanchin Chen
Title: Embedded Cryptographic Hardware: Methodologies and Architectures, Author: Nadia Nedjah
Title: Digital Identity and Access Management: Technologies and Frameworks, Author: Raj Sharman
Title: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, Author: Danda B. Rawat
Title: Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues, Author: Hamid Nemati
Title: Situational Awareness in Computer Network Defense: Principles, Methods and Applications, Author: Cyril Onwubiko

Pagination Links