Digital Image Security : Techniques and Applications
Amit Kumar Singh
Download - Immediately Available
Format: eBook (PDF)
Digital Image Security : Techniques and Applications
Amit Kumar Singh
Download - Immediately Available
Format: eBook (EPUB)
Security Framework for The Internet of Things Applications
Salma Abdalla Hamad
Download - Immediately Available
Format: eBook (PDF)
Security Framework for The Internet of Things Applications
Salma Abdalla Hamad
Download - Immediately Available
Format: eBook (EPUB)
Critical Infrastructure Protection, Risk Management, and Resilience : A Policy Perspective
Kelley A. Pesch-Cronin
Download - Immediately Available
Format: eBook (PDF)
Critical Infrastructure Protection, Risk Management, and Resilience : A Policy Perspective
Kelley A. Pesch-Cronin
Download - Immediately Available
Format: eBook (EPUB)
Transformative AI : Responsible, Transparent, and Trustworthy AI systems
Ahmed Banafa
Download - Immediately Available
Format: eBook (PDF)
Transformative AI : Responsible, Transparent, and Trustworthy AI systems
Ahmed Banafa
Download - Immediately Available
Format: eBook (EPUB)
Digital Transformation in Healthcare 5.0 : Volume 1: IoT, AI and Digital Twin
Rishabha Malviya
Download - Immediately Available
Format: eBook (PDF)
Understanding Cryptography : From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Christof Paar
Download - Immediately Available
Format: eBook (PDF)
Management of Information Security
Whitman/Mattord
Download - Immediately Available
Format: eBook (PDF)
Secure Multiparty Computation and Secret Sharing
Ronald Cramer
Download - Immediately Available
Format: eBook (PDF)
Information Processing and Security Systems
Khalid Saeed
Download - Immediately Available
Format: eBook (PDF)
Official (ISC)2 Guide to the CISSP CBK
Adam Gordon
Download - Immediately Available
Format: eBook (PDF)
Official (ISC)2 Guide to the CISSP CBK
Adam Gordon
Download - Immediately Available
Format: eBook (EPUB)
PRAGMATIC Security Metrics : Applying Metametrics to Information Security
W. Krag, CISM (Enterprise Security Architect, Thousand Oaks, C Brotby
Download - Immediately Available
Format: eBook (PDF)
Complete Guide to CISM Certification
Thomas R. Peltier
Download - Immediately Available
Format: eBook (PDF)
Reforming European Data Protection Law
Serge Gutwirth
Download - Immediately Available
Format: eBook (PDF)
Secure Multiparty Computation and Secret Sharing
Ronald Cramer
Download - Immediately Available
Format: eBook (EPUB)