Items 1 - 15 of 65
1 2 3 4 5
Sort: 

A Practical Guide to Managing Information Security
A Practical Guide to Managing Information Security
By (author): Steve Purser
Published: 03/31/2004
Pages: 280
Advances in Computer Systems Security, Volume 3
Advances in Computer Systems Security, Volume 3
By (author): Rein Turn
Published: 05/31/1988
Pages: 376
Attribute-Based Access Control
Attribute-Based Access Control
Published: 10/01/2017
Pages: 280
Authentication Systems for Secure Networks
Authentication Systems for Secure Networks
By (author): Rolf Oppliger
Published: 03/31/1996
Pages: 186
Aviation Security Engineering
Aviation Security Engineering
Published: 03/31/2011
Pages: 356
Biometrics in Identity Management:
Biometrics in Identity Management:
By (author): Shimon Modi
Published: 08/31/2011
Pages: 250
Bluetooth Security
Bluetooth Security
Published: 05/31/2004
Pages: 222
Computer and Intrusion Forensics
Computer and Intrusion Forensics
Published: 03/31/2003
Pages: 420
Contemporary Cryptography, Second Edition
Contemporary Cryptography, Second Edition
By (author): Rolf Oppliger
Published: 06/30/2011
Pages: 612
Cryptography 101: From Theory to Practice
Cryptography 101: From Theory to Practice
By (author): Rolf Oppliger
Pages: 650
Cryptography for Security and Privacy in Cloud Computing
Cryptography for Security and Privacy in Cloud Computing
By (author)s: Stefan Rass, Daniel Slamanig
Published: 10/31/2013
Pages: 260
Cybersecurity, Risk-based Vulnerability Management (RBVM)
Cybersecurity, Risk-based Vulnerability Management (RBVM)
By (author)s: Michael Roytman, Ed Bellis
Published: 09/30/2022
Pages: 265
Coming Soon: Available 02/28/2023
1 2 3 4 5