Who Goes There? : Authentication Through the Lens of Privacy
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
IDs -- Not That Easy : Questions About Nationwide Identity Systems
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance
Branden (CISSP and CISM) Williams
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£42.99
£40.89
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketRecoverability as a First-Class Security Objective : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Biometric Recognition : Challenges and Opportunities
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Protecting Data Privacy in Health Services Research
Institute of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
Colin Boyd
Download - Immediately Available
Format: eBook (PDF)
Information Security : 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings
George I. Davida
Download - Immediately Available
Format: eBook (PDF)
Provable Security : First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
Willy Susilo
Download - Immediately Available
Format: eBook (PDF)
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008, Proceedings
Steven Galbraith
Download - Immediately Available
Format: eBook (PDF)
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
Joon Sang Baek
Download - Immediately Available
Format: eBook (PDF)
Security Protocols XVII : 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
Bruce Christianson
Download - Immediately Available
Format: eBook (PDF)
Software for Dependable Systems : Sufficient Evidence?
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Cryptography's Role in Securing the Information Society
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Post-Quantum Cryptography : 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings
Michele Mosca
Download - Immediately Available
Format: eBook (PDF)
Information Security and Privacy : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings
Colin Boyd
Download - Immediately Available
Format: eBook (PDF)
Digital Watermarking : 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
Hyoung-Joong Kim
Download - Immediately Available
Format: eBook (PDF)
Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings
Colin Boyd
Download - Immediately Available
Format: eBook (PDF)