Collections

 First Page   Previous   1   2   3   4   5   Next   Last Page 
Secure multi-party non-repudiation protocols and applications

Secure multi-party non-repudiation protocols and applications

Availability : 1 copies available for loan
Low tech hacking : street smarts for security professionals

Low tech hacking : street smarts for security professionals

Availability : 1 copies available for loan
Open research problems in network security

Open research problems in network security

Availability : 1 copies available for loan
Security for web developers

Security for web developers

Availability : 1 copies available for loan
The network security test lab a step by step guide

The network security test lab a step by step guide

Availability : 1 copies available for loan
Security for web services and servicesoriented architectures

Security for web services and servicesoriented architectures

Availability : 1 copies available for loan
Securing and optimizing linux: the hacking solution

Securing and optimizing linux: the hacking solution

Availability : 1 copies available for loan
Rfid security: techniques, protocols and system-on-chip design

Rfid security: techniques, protocols and system-on-chip design

Availability : 1 copies available for loan
Smart tv security: media playback and digital video broadcast

Smart tv security: media playback and digital video broadcast

Availability : 1 copies available for loan
 First Page   Previous   1   2   3   4   5   Next   Last Page