Categories
 
Authors
A B C D
E F G H
I J K L
M N O P
Q R S T
U V W X
Y Z Ø
Encryption
download Encryption books online free pdf mp3 torrent
All Items
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance


John S. Quarterman



Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance ebookJohn S. Quarterman free ADVANCES IN CANCER RESEARCH ...
Progress in Cryptology -  INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings ... Computer Science / Security and Cryptology)

Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings ... Computer Science / Security and Cryptology)


Bimal Roy, Nicolas Sendrier



Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, ...
Cyber Situational Awareness: Issues and Research

Cyber Situational Awareness: Issues and Research


Cliff Wang, Peng Liu, Sushil Jajodia, Vipin Swarup



Cyber Situational Awareness: Issues and Research pdfCliff Wang, Peng Liu, Sushil Jajodia, Vipin Swarup ebook User tagsDownload ISB...
Information Assurance: Managing Organizational IT Security Risks

Information Assurance: Managing Organizational IT Security Risks


Daniel Jennings Information Systems Security Manager European Co, Joseph Boyce Employee Of The Department Of Defense



Information Assurance: Managing Organizational IT Security Risks freeDaniel Jennings Information Systems Security Manager European...
Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)

Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers ... Computer Science / Security and Cryptology)


Philippe Golle, Roger Dingledine



Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Rev...
Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised ... Computer Science / Security and Cryptology)

Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised ... Computer Science / Security and Cryptology)


Aggelos Kiayias, Francesc Sebé, Josep M. Miret, Kazue Sako, Radu Sion, Reza Curtmola, Sven Dietrich



Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28...
The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust


Jeffrey M. Stanton, Kathryn R. Stam



The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Priv...
Data and Applications Security: Developments and Directions

Data and Applications Security: Developments and Directions


B. Thuraisingham, Klaus R. Dittrich, Reind Van De Riet, Zahir Tari



Data and Applications Security: Developments and Directions freeB. Thuraisingham, Klaus R. Dittrich, Reind Van De Riet, Zahir Tari...
Secure Multi-Party Non-Repudiation Protocols and Applications

Secure Multi-Party Non-Repudiation Protocols and Applications


Jianying Zhou, José A. Onieva



Secure Multi-Party Non-Repudiation Protocols and Applications freeJianying Zhou, José A. Onieva free From Publishers Weekly ...
Elsevier's Dictionary of Information Security

Elsevier's Dictionary of Information Security


B. Radichkova, G. Manoilov



Elsevier's Dictionary of Information Security freeB. Radichkova, G. Manoilov pdf User tagsDownload ISBN 0444517707 ISBN 044451770...
Securing E-Business Applications and Communications

Securing E-Business Applications and Communications


John Bowers, Jonathan S. Held



Securing E-Business Applications and Communications freeJohn Bowers, Jonathan S. Held free User tagsDownload ISBN 0849309632 ISBN...
Economics of Identity Theft: Avoidance, Causes and Possible Cures

Economics of Identity Theft: Avoidance, Causes and Possible Cures


L. Jean Camp



Economics of Identity Theft: Avoidance, Causes and Possible Cures ebookL. Jean Camp ebook This professional book discusses privacy...
Smart Card Security and Applications

Smart Card Security and Applications


Mike Hendry



Smart Card Security and Applications pdfMike Hendry ebook User tagsDownload ISBN 1580531566 ISBN 1580531566 books ISBN 158053156...
Security in Sensor Networks

Security in Sensor Networks


Yang Xiao



Security in Sensor Networks ebookYang Xiao pdf User tagsDownload ISBN 0849370582 ISBN 0849370582 books ISBN 0849370582 epub ISB...
Public Key Infrastructure: Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings

Public Key Infrastructure: Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings


Andrea S. Atzeni, Antonio Lioy



Public Key Infrastructure: Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceed...
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)


Abhishek Singh



Identifying Malicious Code Through Reverse Engineering (Advances in Information Security) pdfAbhishek Singh download User tagsDown...
19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them


David Leblanc, John Viega, Michael Howard



19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them ebookDavid Leblanc, John Viega, Michael Howard pdf User...
Secure Programming with Static Analysis

Secure Programming with Static Analysis


Brian Chess, Jacob West



Secure Programming with Static Analysis freeBrian Chess, Jacob West download User tagsDownload ISBN 0321424778 ISBN 0321424778 bo...
Hack Proofing Your Identity

Hack Proofing Your Identity


Teri Bidwell



Hack Proofing Your Identity downloadTeri Bidwell pdf User tagsDownload ISBN 1931836517 ISBN 1931836517 books ISBN 1931836517 epu...
Modern Cryptography: Protect Your Data With Fast Block Ciphers

Modern Cryptography: Protect Your Data With Fast Block Ciphers


A. Moldovyan, B. Izotov, N. Goots, N. Moldovyan



Modern Cryptography: Protect Your Data With Fast Block Ciphers ebookA. Moldovyan, B. Izotov, N. Goots, N. Moldovyan free User tags...
Military Cryptanalysis - Part I: Monoalphabetic Substitution Systems

Military Cryptanalysis - Part I: Monoalphabetic Substitution Systems




Military Cryptanalysis - Part I: Monoalphabetic Substitution Systems download download User tagsDownload ISBN ISBN books ISBN ...
Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange

Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange


Rand Morimoto



Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange ebookRand Morimoto pdf User t...
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, Proceedings ... in Information and Communication Technology)

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, Proceedings ... in Information and Communication Technology)


Elisabeth De Leeuw, Lothar Fritsch, Simone Fischer-Hübner



Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 20...
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)

Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, ... Computer Science / Security and Cryptology)


Cecilia S. Gal, Michael E. Lesk, Paul B. Kantor



Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, N...
Security Engineering: A Guide to Building Dependable Distributed Systems

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson



Security Engineering: A Guide to Building Dependable Distributed Systems downloadRoss J. Anderson pdf User tagsDownload ISBN 04700...
Showing 1 to 25 of 882
© 2019 qsbook.com
visa master card