Title: Seven Deadliest Unified Communications Attacks, Author: Dan York
Title: Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings / Edition 1, Author: Wenbo Mao
Title: Information and Communications Security: First International Conference, ICIS'97, Beijing, China, November 11-14, 1997, Proceedings / Edition 1, Author: Yongfei Han
Title: Information and Communications Security: 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings / Edition 1, Author: Liqun Chen
Title: Emerging Trends in Information and Communication Security: International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings / Edition 1, Author: Günter Müller
Title: Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings / Edition 1, Author: Jonathan Katz
Title: Communications and Multimedia Security: 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings / Edition 1, Author: Herbert Leitold
Title: Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings / Edition 1, Author: Vijay Varadharajan
Title: Communications and Multimedia Security: 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings / Edition 1, Author: Jana Dittmann
Title: Information and Communications Security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings / Edition 1, Author: Petra Perner
Title: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings / Edition 1, Author: Antonio Lioy
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Ultimate Telecommunications Security Survey, Author: James L Schaub
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C / Edition 2, Author: Bruce Schneier
Title: Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies, Author: Babak Akhgar
Title: Secure Communicating Systems: Design, Analysis, and Implementation, Author: Michael R. A. Huth
Title: Disaster Recovery Planning for Communic, Author: Leo A Wrobel
Title: Information and Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / Edition 1, Author: Javier López
Title: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom / Edition 1, Author: David Chadwick
Title: Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia / Edition 1, Author: Borka Jerman-Blazic

Pagination Links