Limit Search Results
Author
Language
Format
Subject
167 Results Found Subscribe to search results
000000000000MAIN
Print
25. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
27. 
Cover image for Analyzing computer security : a threat/vulnerability/countermeasure approach
28. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
34. 
Cover image for Information assurance and security ethics in complex systems : interdisciplinary perspectives