Trustworthy Execution on Mobile Devices
Amit Vasudevan
Download - Immediately Available
Format: eBook (PDF)
Location Privacy Protection in Mobile Networks
Xinxin Liu
Download - Immediately Available
Format: eBook (PDF)
Security Assessment in Vehicular Networks
Suguo Du
Download - Immediately Available
Format: eBook (PDF)
Intrusion Detection in Distributed Systems : An Abstraction-Based Approach
Peng Ning
Download - Immediately Available
Format: eBook (PDF)
A Guide to Data Compression Methods
David Salomon
Download - Immediately Available
Format: eBook (PDF)
Certification and Security in Inter-Organizational E-Services : IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France
Enrico Nardelli
Download - Immediately Available
Format: eBook (PDF)
Advances in Cryptology - CRYPTO '88 : Proceedings
Shafi Goldwasser
Download - Immediately Available
Format: eBook (PDF)
Advances in Cryptology - CRYPTO '89 : Proceedings
Gilles Brassard
Download - Immediately Available
Format: eBook (PDF)
Economics of Identity Theft : Avoidance, Causes and Possible Cures
L. Jean Camp
Download - Immediately Available
Format: eBook (PDF)
Online Business Security Systems
Godfried B. Williams
Download - Immediately Available
Format: eBook (PDF)
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
George I Davida
Download - Immediately Available
Format: eBook (PDF)
The Mathematics of Secrets : Cryptography from Caesar Ciphers to Digital Encryption
Joshua Holden
Download - Immediately Available
Format: eBook (PDF)
Hardening Cisco Routers : Help for Network Administrators
Thomas Akin
Download - Immediately Available
Format: eBook (PDF)
Managing Security with Snort & IDS Tools : Intrusion Detection with Open Source Tools
Kerry J. Cox
Download - Immediately Available
Format: eBook (PDF)
Network Security Assessment : Know Your Network
Chris McNab
Download - Immediately Available
Format: eBook (PDF)
Mapping Hacks : Tips & Tools for Electronic Cartography
Schuyler Erle
Download - Immediately Available
Format: eBook (PDF)
Snort Cookbook : Solutions and Examples for Snort Administrators
Angela Orebaugh
Download - Immediately Available
Format: eBook (PDF)
Beautiful Security : Leading Security Experts Explain How They Think
Andy Oram
Download - Immediately Available
Format: eBook (PDF)
Digital Identity : Unmasking Identity Management Architecture (IMA)
Phillip J. Windley
Download - Immediately Available
Format: eBook (EPUB)
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Jothy Rosenberg
Download - Immediately Available
Format: eBook (PDF)
Multimedia Watermarking Techniques and Applications
Darko Kirovski
Download - Immediately Available
Format: eBook (EPUB)