Title: Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Author: Hamid R. Nemati
Title: Artificial Immune System: Applications in Computer Security / Edition 1, Author: Ying Tan
Title: Information Security Risk Analysis / Edition 3, Author: Thomas R. Peltier
Title: Business Data Networks and Security / Edition 10, Author: Raymond Panko
Title: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, Author: Ehab Al-Shaer
Title: Guide to Elliptic Curve Cryptography / Edition 1, Author: Darrel Hankerson
Title: Advances in Cyber Security: Principles, Techniques, and Applications, Author: Kuan-Ching Li
Title: Handbook of Big Data Privacy, Author: Kim-Kwang Raymond Choo
Title: Cyber-Security and Threat Politics: US Efforts to Secure the Information Age / Edition 1, Author: Myriam Dunn Cavelty
Title: Mobile Computation with Functions / Edition 1, Author: Zeliha Dilsun Kirli
Title: Digital Forensics Explained / Edition 1, Author: Greg Gogolin
Title: Handbook on Securing Cyber-Physical Critical Infrastructure, Author: Sajal K Das
Title: Security Informatics and Terrorism: Patrolling the Web: Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web, Author: Cecilia S. Gal
Title: Protecting Business Information: A Manager's Guide / Edition 1, Author: James A Schweitzer
Title: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes: Vol. 23 NATO Science for Peace and Security Series - D: Information and Communication Security, Author: B. Preneel
Title: Primality Testing and Integer Factorization in Public-Key Cryptography / Edition 2, Author: Song Y. Yan
Title: IT Audit, Control, and Security / Edition 1, Author: Robert R. Moeller
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: System-on-Chip Architectures and Implementations for Private-Key Data Encryption / Edition 1, Author: Mïire McLoone
Title: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication / Edition 1, Author: Andreas Uhl

Pagination Links