Items 31 - 45 of 65
1 2 3 4 5
Sort: 

Information Hiding
Information Hiding
Published: 12/20/2015
Pages: 312
Internet and Intranet Security, Second Edition
Internet and Intranet Security, Second Edition
By (author): Rolf Oppliger
Published: 10/31/2001
Pages: 430
Introduction to Identity-Based Encryption
Introduction to Identity-Based Encryption
By (author): Luther Martin
Published: 02/29/2008
Pages: 254
Lifecycle IoT Security for Engineers
Lifecycle IoT Security for Engineers
By (author): Kaustubh Dhondge
Published: 09/30/2021
Pages: 230
Machine Cryptography and Modern Cryptanalysis
Machine Cryptography and Modern Cryptanalysis
Published: 03/31/1985
Pages: 259
Multicast and Group Security
Multicast and Group Security
Published: 05/31/2003
Pages: 334
Multimodal Surveillance: Sensors, Algorithms, and Systems
Multimodal Surveillance: Sensors, Algorithms, and Systems
By (author)s: Thomas Huang, Zhigang Zhu
Published: 07/31/2007
Pages: 446
Outsourcing Information Security
Outsourcing Information Security
By (author): C. Warren Axelrod
Published: 09/30/2004
Pages: 266
Practical Computer Network Security
Practical Computer Network Security
By (author): Michael Hendry
Published: 08/31/1995
Pages: 203
Practical Guide to Implementing Secure Intranets and Extranets
Practical Guide to Implementing Secure Intranets and Extranets
By (author): Kaustubh M. Phaltankar
Published: 11/30/1999
Pages: 428
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
Published: 09/30/2004
Pages: 364
Role Engineering for Enterprise Security Management
Role Engineering for Enterprise Security Management
Published: 11/30/2007
Pages: 256
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Published: 01/31/2007
Pages: 418
1 2 3 4 5