Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Computers Under Attack: Intruders, Worms and Viruses, Author: Peter Denning
Title: Disaster Recovery Planning For Telecommunications, Author: Leo A. Wrobel
Title: Service Breakthroughs, Author: James L. Heskett
Title: Principles Of Secure Communication Systems, Author: Don J. Torrieri
Title: Secure Data Networking, Author: Michael Purser
Title: A Pathology of Computer Viruses, Author: David Ferbrache
Title: Computer Security - ESORICS 94: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings / Edition 1, Author: Dieter Gollmann
Title: Anti-Virus Tools and Techniques for Computer, Author: W. Timothy Polk
Title: Ultimate Telecommunications Security Survey, Author: James L Schaub
Title: Communications and Multimedia Security / Edition 1, Author: Reinhard Posch
Title: Practical Computer Network Security, Author: Mike Hendry
Title: Advances in Cryptology - CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995. Proceedings, Author: Don Coppersmith
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Authentication Systems For Secure Networks, Author: Rolf Oppliger Ph.D.
Title: Guide to Computer Viruses: How to avoid them, how to get rid of them, and how to get help, Author: Robert Slade
Title: Communications and Multimedia Security II / Edition 1, Author: Patrick Horster
Title: The Day After...In Cyberspace: An Exploration of Cyberspace Security R&D Investment Strategies for DARPA, Author: Robert H. Anderson
Title: The Fugitive Game: Online with Kevin Mitnick, Author: Jonathan Littman
Title: Networking Security and Standards / Edition 1, Author: Weidong Kou

Pagination Links