Power and Security in the Information Age : Investigating the Role of the State in Cyberspace
Myriam Dunn Cavelty
Download - Immediately Available
Format: eBook (EPUB)
Power and Security in the Information Age : Investigating the Role of the State in Cyberspace
Myriam Dunn Cavelty
Download - Immediately Available
Format: eBook (PDF)
Cryptography : The Key to Digital Security, How It Works, and Why It Matters
Keith Martin
Download - Immediately Available
Format: eBook (EPUB)
Mission-Critical Security Planner : When Hackers Won't Take No for an Answer
Eric Greenberg
Download - Immediately Available
Format: eBook (PDF)
Defending the Digital Frontier : A Security Agenda
Mark W. Doll
Download - Immediately Available
Format: eBook (PDF)
Sarbanes-Oxley Guide for Finance and Information Technology Professionals
Sanjay Anand
Download - Immediately Available
Format: eBook (PDF)
Handbook of Applied Cryptography
Alfred J. Menezes
Download - Immediately Available
Format: eBook (EPUB)
Security without Obscurity : A Guide to Cryptographic Architectures
Jeff Stapleton
Download - Immediately Available
Format: eBook (EPUB)
Security without Obscurity : A Guide to Cryptographic Architectures
Jeff Stapleton
Download - Immediately Available
Format: eBook (PDF)
Foundations of Cryptography: Volume 2, Basic Applications
Oded Goldreich
Download - Immediately Available
Format: eBook (EPUB)
Noiseless Steganography : The Key to Covert Communications
Abdelrahman Desoky
Download - Immediately Available
Format: eBook (PDF)
An Introduction to Data Structures and Algorithms
J.A. Storer
Download - Immediately Available
Format: eBook (PDF)
Mobile Authentication : Problems and Solutions
Markus Jakobsson
Download - Immediately Available
Format: eBook (PDF)
Automatic Malware Analysis : An Emulator Based Approach
Heng Yin
Download - Immediately Available
Format: eBook (PDF)
Trustworthy Execution on Mobile Devices
Amit Vasudevan
Download - Immediately Available
Format: eBook (PDF)
Location Privacy Protection in Mobile Networks
Xinxin Liu
Download - Immediately Available
Format: eBook (PDF)
Security Assessment in Vehicular Networks
Suguo Du
Download - Immediately Available
Format: eBook (PDF)
Intrusion Detection in Distributed Systems : An Abstraction-Based Approach
Peng Ning
Download - Immediately Available
Format: eBook (PDF)
Noiseless Steganography : The Key to Covert Communications
Abdelrahman Desoky
Download - Immediately Available
Format: eBook (EPUB)
Image Encryption : A Communication Perspective
Fathi E. Abd El-Samie
Download - Immediately Available
Format: eBook (PDF)