Limit Search Results
Author
Language
Format
Subject
57 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for AWS Certified Solutions Architecture study guide : Associate (SAA-C01) Exam
2. 
Cover image for Cyber Harassment and Policy Reform in the Digital Age : Emerging Research and Opportunities
3. 
Cover image for Privacy and Security Policies in Big Data
8. 
Cover image for Designing and building security operations center
9. 
Cover image for Cryptography for security and privacy in cloud computing
10. 
Cover image for Secure Messaging on the Internet
11. 
Cover image for Network security technologies : design and applications
12. 
Cover image for Security, privacy, trust, and resource management in mobile and wireless communications
13. 
Cover image for Research developments in biometrics and video processing techniques
14. 
Cover image for Engineering safe and secure software systems
15. 
Cover image for Introduction to security
16. 
Cover image for Private Berlin
17. 
Cover image for Conflict Management for Security Professionals / Andrew A.Tufano
18. 
Cover image for Security and loss prevention : an introduction
19. 
Cover image for Security consulting
20. 
Cover image for Contemporary security management
21. 
Cover image for Effective security management
22. 
Cover image for Biometrics in identity management : concepts to applications
23. 
Cover image for Identity management : concepts, technologies, and systems
24. 
Cover image for Security : an introduction
25. 
Cover image for Contemporary cryptography
26. 
Cover image for Privacy-aware knowledge discovery : novel applications and new techniques
27. 
Cover image for SSL and TLS : theory and practice
28. 
Cover image for Security and loss prevention : an introduction
29. 
Cover image for Introduction to identity-based encryption
30. 
Cover image for Introduction to security
31. 
Cover image for Role engineering for enterprise security management
32. 
Cover image for Introduction to executive protection
34. 
Cover image for Fuzzing for software security testing and quality assurance
35. 
Cover image for Implementing the ISO/IEC 27001 information security management system standard
36. 
Cover image for Role-based access control
37. 
Cover image for Security operations management
38. 
Cover image for Security, Privacy, and Trust in Modern Data Management
39. 
Cover image for Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007: Proceedings
40. 
Cover image for Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007: Proceedings
41. 
Cover image for Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings
42. 
Cover image for New approaches for security, privacy and trust in complex environments proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
43. 
Cover image for Privacy protection for e-services
44. 
Cover image for Physical and technical security : an introduction
45. 
Cover image for IPSec VPN design the definitive design and deployment guide for secure virtual private networks
46. 
Cover image for Private security and the law
47. 
Cover image for Proactive security administration
48. 
Cover image for Introduction to security
49. 
Cover image for Privacy protection and computer forensics
50. 
Cover image for The Face
51. 
Cover image for Network security : private communication in a public world
53. 
Cover image for Trust management in mobile environments : autonomic and usable models
56. 
Cover image for Security, Privacy and Reliability in Computer Communications and Networks
57. 
Cover image for PRIVATE LONDON : THE WORLD'S MOST EXCLUSIVE DETECTIVE AGENCY