Security Framework for The Internet of Things Applications
Salma Abdalla (Maquarie university, Australia) Hamad
Download - Immediately Available
Format: eBook (PDF)
Security Framework for The Internet of Things Applications
Salma Abdalla (Maquarie university, Australia) Hamad
Download - Immediately Available
Format: eBook (EPUB)
Handbook of Applied Cryptography
Alfred J. Menezes
Download - Immediately Available
Format: eBook (PDF)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
Henri Cohen
Download - Immediately Available
Format: eBook (PDF)
Cyber and Information Security Collection : Collection
IT Governance Publishing
Download - Immediately Available
Format: eBook (EPUB)
EU General Data Protection Regulation (GDPR) - An implementation and compliance guide, fourth edition
IT Governance Privacy Team
Download - Immediately Available
Format: eBook (PDF)
EU General Data Protection Regulation (GDPR) - An implementation and compliance guide, fourth edition
IT Governance Privacy Team
Download - Immediately Available
Format: eBook (EPUB)
Open Information Security Management Maturity Model O-ISM3
The Group
Download - Immediately Available
Format: eBook (PDF)
Sharing Health Data : The Why, the Will, and the Way Forward
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Health Data Sharing to Support Better Outcomes : Building a Foundation of Stakeholder Trust
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Intelligent Cyber-Physical Systems Security for Industry 4.0 : Applications, Challenges and Management
Jyoti Sekhar (BIT, Kolkata) Banerjee
Download - Immediately Available
Format: eBook (PDF)
Intelligent Cyber-Physical Systems Security for Industry 4.0 : Applications, Challenges and Management
Jyoti Sekhar (BIT, Kolkata) Banerjee
Download - Immediately Available
Format: eBook (EPUB)
Video Coding for Mobile Communications : Efficiency, Complexity and Resilience
Mohammed Al-Mualla
Download - Immediately Available
Format: eBook (PDF)
A Multidisciplinary Introduction to Information Security
Stig F. Mjolsnes
Download - Immediately Available
Format: eBook (PDF)
Introduction to Cryptography with Open-Source Software
Alasdair McAndrew
Download - Immediately Available
Format: eBook (PDF)
Authentication Codes and Combinatorial Designs
Dingyi Pei
Download - Immediately Available
Format: eBook (PDF)
Handbook of Applied Cryptography
Alfred J. Menezes
Download - Immediately Available
Format: eBook (EPUB)
Introduction to Coding Theory
Jurgen Bierbrauer
Download - Immediately Available
Format: eBook (PDF)
Introduction to Coding Theory
Jurgen Bierbrauer
Download - Immediately Available
Format: eBook (EPUB)
Ada and Beyond : Software Policies for the Department of Defense
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang (The University of Alabama, Tuscaloosa, USA) Xiao
Download - Immediately Available
Format: eBook (EPUB)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang (The University of Alabama, Tuscaloosa, USA) Xiao
Download - Immediately Available
Format: eBook (PDF)
Database and Applications Security : Integrating Information Security and Data Management
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (PDF)