Similar Items
Computer security and cryptography
by: Konheim 1934-
Published: (2007)
by: Konheim 1934-
Published: (2007)
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
by: Katz, Jonathan, 1974-, et al.
Published: (2008)
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015)
by: Katz, Jonathan, et al.
Published: (2015)
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021)
by: Katz, Jonathan 1974-, et al.
Published: (2021)
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)
by: Schneier, Bruce 1963
Published: (2015)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Cryptography,information theory,and error-correction a handbook for the 21st century
by: Bruen
Published: (2005)
by: Bruen
Published: (2005)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Wireless security and cryptography specifications and implementations
Published: (2007)
Published: (2007)
Cryptography in the database the last line of defense
by: Kenan
Published: (2005)
by: Kenan
Published: (2005)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
Principles of information systems security text and cases
by: Dhillon 1963-
Published: (2007)
by: Dhillon 1963-
Published: (2007)
Applied cryptoography second edition protocols, algorithms and source code in C
by: Schneier
Published: (1996)
by: Schneier
Published: (1996)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Googling security : how much does Google know about you? /
by: Conti, Greg
Published: (2009)
by: Conti, Greg
Published: (2009)
Insider threats
by: Arduin, Pierre-Emmanuel
Published: (2018)
by: Arduin, Pierre-Emmanuel
Published: (2018)
CompTIA Security+ 2008 in depth
by: Ciampa, Mark
Published: (2008)
by: Ciampa, Mark
Published: (2008)
SECURITY TESTING MODEL FOR DETECTING SQL INJECTION VULNERABILITY IN WEB APPLICATION /
by: Nor Fatimah Awang
by: Nor Fatimah Awang
Contemporary cryptology the science of information integrity
Published: (1992)
Published: (1992)
Information security evaluation a holistic approach
by: Tashi, Igli
Published: (2011)
by: Tashi, Igli
Published: (2011)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Architecturing secure software systems
by: Talukderan, Asoke K.
Published: (2009)
by: Talukderan, Asoke K.
Published: (2009)
Cryptography for security and privacy in cloud computing
by: Rass, Stefan, et al.
Published: (2014)
by: Rass, Stefan, et al.
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Dissappearing cryptography information hiding steganography & watermarking
by: Wayner, Peter 1964-
Published: (2009)
by: Wayner, Peter 1964-
Published: (2009)
The craft system security
by: Smith 1964-
Published: (2007)
by: Smith 1964-
Published: (2007)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
Computer and information security handbook
Published: (2009)
Published: (2009)
Similar Items
-
Computer security and cryptography
by: Konheim 1934-
Published: (2007) -
Introduction to modern cryptography
by: Katz, Jonathan, 1974-, et al.
Published: (2008) -
Introduction to modern cryptography
by: Katz, Jonathan, et al.
Published: (2015) -
Introduction to modern cryptography
by: Katz, Jonathan 1974-, et al.
Published: (2021) -
Applied cryptography protocols, algorithms, and source code in C
by: Schneier, Bruce 1963
Published: (2015)


