Title: 21st Century Prometheus: Managing CBRN Safety and Security Affected by Cutting-Edge Technologies, Author: Maurizio Martellini
Title: 802.1X Port-Based Authentication, Author: Edwin Lyle Brown
Title: A Classical Introduction to Cryptography Exercise Book, Author: Thomas Baigneres
Title: A Classical Introduction to Cryptography: Applications for Communications Security, Author: Serge Vaudenay
Title: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice, Author: Jason Edwards
Title: A Cryptography Primer: Secrets and Promises, Author: Philip N. Klein
Title: A Cybersecurity Leader's Journey: Speaking the Language of the Board, Author: Edward Marchewka
Title: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0), Author: Dan Shoemaker
Title: A Hacker I Am Vol 2, Author: Craig Ford
Title: A Hacker, I Am, Author: Craig Ford
Title: A History of Cyber Security Attacks: 1980 to Present, Author: Bruce Middleton
Title: A Practical Guide To Managing Information Security, Author: Steve Purser
Title: A Practical Guide to Security Assessments, Author: Sudhanshu Kairab
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: A Vulnerable System: The History of Information Security in the Computer Age, Author: Andrew J. Stewart
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Access Control, Security, and Trust: A Logical Approach, Author: Shiu-Kai Chin
Title: Adaptive Autonomous Secure Cyber Systems, Author: Sushil Jajodia
Title: Adopting Biometric Technology: Challenges and Solutions, Author: Ravindra Das
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia, Author: Borka Jerman-Blazic

Pagination Links