Title: 21st Century Prometheus: Managing CBRN Safety and Security Affected by Cutting-Edge Technologies, Author: Maurizio Martellini
Title: 802.1X Port-Based Authentication, Author: Edwin Lyle Brown
Title: A Classical Introduction to Cryptography Exercise Book, Author: Thomas Baigneres
Title: A Classical Introduction to Cryptography: Applications for Communications Security / Edition 1, Author: Serge Vaudenay
Title: A Cryptography Primer: Secrets and Promises, Author: Philip N. Klein
Title: A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) / Edition 1, Author: Dan Shoemaker
Title: A History of Cyber Security Attacks: 1980 to Present / Edition 1, Author: Bruce Middleton
Title: A Practical Guide To Managing Information Security / Edition 1, Author: Steve Purser
Title: A Practical Guide to Security Assessments / Edition 1, Author: Sudhanshu Kairab
Title: A Practical Guide to Security Engineering and Information Assurance / Edition 1, Author: Debra S. Herrmann
Title: A Vulnerable System: The History of Information Security in the Computer Age, Author: Andrew J. Stewart
Title: Access Control Management in Cloud Environments, Author: Hua Wang
Title: Access Control, Security, and Trust: A Logical Approach / Edition 1, Author: Shiu-Kai Chin
Title: Adaptive Autonomous Secure Cyber Systems, Author: Sushil Jajodia
Title: Adopting Biometric Technology: Challenges and Solutions / Edition 1, Author: Ravindra Das
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia / Edition 1, Author: Borka Jerman-Blazic
Title: Advanced Concepts in Defensive Tactics: A Survival Guide for Law Enforcement / Edition 1, Author: Chuck Joyner
Title: Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques / Edition 1, Author: Robert J Girod
Title: Advanced Cybersecurity Technologies, Author: Ralph Moseley
Title: Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits / Edition 1, Author: Eric Peeters

Pagination Links