Categories
 
Authors
A B C D
E F G H
I J K L
M N O P
Q R S T
U V W X
Y Z Ø
Security & Encryption
All Items
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications


Murray R. Bremner



Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications downloadMurray R. Bremner download ...
Cybersecurity: Public Sector Threats and Responses

Cybersecurity: Public Sector Threats and Responses


Kim J. Andreasson



Cybersecurity: Public Sector Threats and Responses downloadKim J. Andreasson pdf —Karen S. Eva...
iOS Forensic Analysis: for iPhone, iPad, and iPod touch

iOS Forensic Analysis: for iPhone, iPad, and iPod touch


Sean Morrissey



iOS Forensic Analysis: for iPhone, iPad, and iPod touch ebookSean Morrissey free Sean F. Morrissey ha...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Andrew Honig, Michael Sikorski



Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software pdfAndrew Honig, Michael Sikorski ebook ...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats


John Pirc, Will Gragido



Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats pdfJohn Pirc, Will Gragido download ...
Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks)

Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks)


Brad Haines



Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks) freeBrad Haines download Seve...
Type and Effect Systems: Behaviours for Concurrency

Type and Effect Systems: Behaviours for Concurrency


Flemming Nielson, Hanne Riis Nielson, Torben Amtoft



Type and Effect Systems: Behaviours for Concurrency freeFlemming Nielson, Hanne Riis Nielson, Torben Amtoft freePresents and devel...
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Introduction to Cryptography (Undergraduate Texts in Mathematics)


Johannes Buchmann



Introduction to Cryptography (Undergraduate Texts in Mathematics) downloadJohannes Buchmann pdf ...
Secure Java: For Web Application Development

Secure Java: For Web Application Development


Abhay Bhargav, B. V. Kumar



Secure Java: For Web Application Development ebookAbhay Bhargav, B. V. Kumar pdf —Kris Gopalak...
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, ... Computer Science   Security and Cryptology)

Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, ... Computer Science Security and Cryptology)


Alessandro Armando, Gavin Lowe



Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, ...
Hacking the Xbox: An Introduction to Reverse Engineering

Hacking the Xbox: An Introduction to Reverse Engineering


Andrew Huang



Hacking the Xbox: An Introduction to Reverse Engineering downloadAndrew Huang ebook This--this being ...
Nmap Cookbook: The Fat-free Guide to Network Scanning

Nmap Cookbook: The Fat-free Guide to Network Scanning


Nicholas Marsh



Nmap Cookbook: The Fat-free Guide to Network Scanning pdfNicholas Marsh freeNmap(r) Cookbook: The fat-free guide to network scanni...
Computer Vision and Computer Graphics. Theory and Applications: International Conference VISIGRAPP 2007, Barcelona, Spain, March 8-11, 2007, Revised Selected ... in Computer and Information Science)

Computer Vision and Computer Graphics. Theory and Applications: International Conference VISIGRAPP 2007, Barcelona, Spain, March 8-11, 2007, Revised Selected ... in Computer and Information Science)


Hélder J. Araújo, José Braz, Alpesh Ranchordas, Joao Madeiras Pereira



Computer Vision and Computer Graphics. Theory and Applications: International Conference VISIGRAPP 2007, Barcelona, Spain, March 8...
Broadband Quantum Cryptography (Synthesis Lectures on Quantum Computing)

Broadband Quantum Cryptography (Synthesis Lectures on Quantum Computing)


Daniel J. Rogers



Broadband Quantum Cryptography (Synthesis Lectures on Quantum Computing) downloadDaniel J. Rogers pdfQuantum cryptography is a rap...
Safety and Security in Multiagent Systems: Research Results from 2004-2006 (Lecture Notes in Computer Science   Lecture Notes in Artificial Intelligence)

Safety and Security in Multiagent Systems: Research Results from 2004-2006 (Lecture Notes in Computer Science Lecture Notes in Artificial Intelligence)


Diana F. Gordon-Spears, Mike Barley, Paul Scerri, Amy Unruh, Fabio Massacci, Haris Mouratidis



Safety and Security in Multiagent Systems: Research Results from 2004-2006 (Lecture Notes in Computer Science Lecture Notes in A...
Active and Programmable Networks: IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised ... Networks and Telecommunications)

Active and Programmable Networks: IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005, Revised ... Networks and Telecommunications)


David Hutchison, Gary J. Minden, Spyros Denazis, Laurent Lefevre



Active and Programmable Networks: IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-...
Networked Services and Applications - Engineering, Control and Management: 16th EUNICE IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June ... Applications, incl. Internet Web, and HCI)

Networked Services and Applications - Engineering, Control and Management: 16th EUNICE IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June ... Applications, incl. Internet Web, and HCI)


Finn Arve Aagesen, Svein J. Knapskog



Networked Services and Applications - Engineering, Control and Management: 16th EUNICE IFIP WG 6.6 Workshop, EUNICE 2010, Trondhei...
Cryptography and Coding: 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings (Lecture Notes in Computer Science   Security and Cryptology)

Cryptography and Coding: 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings (Lecture Notes in Computer Science Security and Cryptology)


Matthew G. Parker



Cryptography and Coding: 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings (Lectur...
Ad-Hoc, Mobile and Wireless Networks: 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings (Lecture Notes ... Networks and Telecommunications)

Ad-Hoc, Mobile and Wireless Networks: 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings (Lecture Notes ... Networks and Telecommunications)


J. J. Garcia-Luna-Aceves, Pedro M. Ruiz



Ad-Hoc, Mobile and Wireless Networks: 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedi...
On the Move to Meaningful Internet Systems: OTM 2009: Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, ... Applications, incl. Internet Web, and HCI)

On the Move to Meaningful Internet Systems: OTM 2009: Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, ... Applications, incl. Internet Web, and HCI)


Pilar Herrero, Robert Meersman, Tharam Dillon



On the Move to Meaningful Internet Systems: OTM 2009: Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vi...
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance


Anton Chuvakin, Branden R. Williams



PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance freeAnton Chuvakin, Branden R. Williams p...
Information Security: 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Lecture Notes in Computer Science   Security and Cryptology)

Information Security: 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Lecture Notes in Computer Science Security and Cryptology)


Claudio Agostino Ardagna, Fabio Martinelli, Moti Yung, Pierangela Samarati



Information Security: 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Lecture Notes in Compu...
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)


Carl Timm, Richard Perez



Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks) pdfCarl Timm, Richard Perez ebook ...
Information Security

Information Security


Gene Tsudik, Mike Burmester, Ivana Ilic, Spyros S. Magliveras



Information Security downloadGene Tsudik, Mike Burmester, Ivana Ilic, Spyros S. Magliveras pdf This b...
Smart Spaces and Next Generation Wired Wireless Networking: 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART ... Networks and Telecommunications)

Smart Spaces and Next Generation Wired Wireless Networking: 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART ... Networks and Telecommunications)


Dmitri Moltchanov, Sergey Balandin, Yevgeni Koucheryavy



Smart Spaces and Next Generation Wired Wireless Networking: 9th International Conference, NEW2AN 2009 and Second Conference on Sma...
Showing 26 to 50 of 1972
© 2019 qsbook.com
visa master card