Book titles in this series
-
-
Global Initiatives to Secure Cyberspace
An Emerging Landscape
- Editors:
-
- Michael Portnoy
- Seymour Goodman
- Copyright: 2009
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Computer Viruses and Malware
- Authors:
-
- John Aycock
- Copyright: 2006
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Security in E-Learning
- Authors:
-
- Edgar R. Weippl
- Copyright: 2005
Available Renditions
- Hard cover
- Soft cover
- eBook
-
CryptoGraphics
Exploiting Graphics Cards For Security
- Authors:
-
- Debra Cook
- Angelos D. Keromytis
- Copyright: 2006
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Primality Testing and Integer Factorization in Public-Key Cryptography
- Authors:
-
- Song Y. Yan
- Copyright: 2009
Available Renditions
- Hard cover
- Soft cover
- eBook
-
The Austin Protocol Compiler
- Authors:
-
- Tommy M. McGuire
- Mohamed G. Gouda
- Copyright: 2005
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Biometric User Authentication for IT Security
From Fundamentals to Handwriting
- Authors:
-
- Claus Vielhauer
- Copyright: 2006
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Botnet Detection
Countering the Largest Security Threat
- Editors:
-
- Wenke Lee
- Cliff Wang
- David Dagon
- Copyright: 2008
Available Renditions
- Hard cover
- Soft cover
- eBook
-
Secure Key Establishment
- Authors:
-
- Kim-Kwang Raymond Choo
- Copyright: 2009
Available Renditions
- Hard cover
- Soft cover
- eBook