Items 1 - 15 of 60
1 2 3 4
Sort: 

A Practical Guide to Managing Information Security
A Practical Guide to Managing Information Security
By (author): Steve Purser
Published: 03/31/2004
Pages: 280
Advances in Computer Systems Security, Volume 3
Advances in Computer Systems Security, Volume 3
By (author): Rein Turn
Published: 05/31/1988
Pages: 376
Attribute-Based Access Control
Attribute-Based Access Control
Published: 10/01/2017
Pages: 280
Authentication Systems for Secure Networks
Authentication Systems for Secure Networks
By (author): Rolf Oppliger
Published: 03/31/1996
Pages: 186
Aviation Security Engineering
Aviation Security Engineering
Published: 03/31/2011
Pages: 356
Biometrics In Identity Management:
Biometrics In Identity Management:
By (author): Shimon Modi
Published: 08/31/2011
Pages: 250
Bluetooth Security
Bluetooth Security
Published: 05/31/2004
Pages: 222
Computer and Intrusion Forensics
Computer and Intrusion Forensics
Published: 03/31/2003
Pages: 420
Computer Forensics and Privacy
Computer Forensics and Privacy
Published: 08/31/2001
Pages: 394
Contemporary Cryptography, Second Edition
Contemporary Cryptography, Second Edition
By (author): Rolf Oppliger
Published: 06/30/2011
Pages: 612
Cryptography for Security & Privacy in Cloud Computing
Cryptography for Security & Privacy in Cloud Computing
By (author)s: Stefan Rass, Daniel Slamanig
Published: 10/31/2013
Pages: 260
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
By (author): Jose Nazario
Published: 10/31/2003
Pages: 318
1 2 3 4