Items 16 - 30 of 69
1 2 3 4 5
Sort: 

Information Hiding
Information Hiding
Published: 12/20/2015
Pages: 312
Security for Cloud Computing
Security for Cloud Computing
Published: 09/30/2015
Pages: 184
Secure Messaging on the Internet
Secure Messaging on the Internet
By (author): Rolf Oppliger
Published: 07/31/2014
Pages: 282
Cryptography for Security and Privacy in Cloud Computing
Cryptography for Security and Privacy in Cloud Computing
By (author)s: Stefan Rass, Daniel Slamanig
Published: 10/31/2013
Pages: 260
Engineering Safe and Secure Software Systems
Engineering Safe and Secure Software Systems
By (author): C. Warren Axelrod
Published: 11/30/2012
Pages: 350
Biometrics in Identity Management:
Biometrics in Identity Management:
By (author): Shimon Modi
Published: 08/31/2011
Pages: 250
Contemporary Cryptography, Second Edition
Contemporary Cryptography, Second Edition
By (author): Rolf Oppliger
Published: 06/30/2011
Pages: 612
Aviation Security Engineering
Aviation Security Engineering
Published: 03/31/2011
Pages: 356
Identity Management-Concepts, Technologies, and Systems
Identity Management-Concepts, Technologies, and Systems
Published: 12/30/2010
Pages: 194
The Business Privacy Law Handbook
The Business Privacy Law Handbook
By (author): Charles H. Kennedy
Published: 04/30/2008
Pages: 203
Introduction to Identity-Based Encryption
Introduction to Identity-Based Encryption
By (author): Luther Martin
Published: 02/29/2008
Pages: 254
Role Engineering for Enterprise Security Management
Role Engineering for Enterprise Security Management
Published: 11/30/2007
Pages: 256
1 2 3 4 5