Eppendorf

information security and cryptology icisc 2011 14th international conference

information security and cryptology icisc 2011 14th international conference

Recommended

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

$4.68

View Details
Information Security Architecture: An Integrated Approach to Securit - VERY GOOD
Information Security Architecture: An Integrated Approach to Securit - VERY GOOD

$14.45

View Details
Introduction to Security by Robert J. Fischer,Edward Halibozek,Gion Green, Accep
Introduction to Security by Robert J. Fischer,Edward Halibozek,Gion Green, Accep

$5.79

View Details
Applied Cryptography: Protocols, Algorithms, and Source Code in C - VERY GOOD
Applied Cryptography: Protocols, Algorithms, and Source Code in C - VERY GOOD

$4.69

View Details
The Pentester BluePrint: Starting a Career as an Ethical Hacker - GOOD
The Pentester BluePrint: Starting a Career as an Ethical Hacker - GOOD

$10.15

View Details
(Isc)2 Cissp Certified Information Systems Security Professional Official...
(Isc)2 Cissp Certified Information Systems Security Professional Official...

$7.03

View Details
The Security Risk Assessment Handbook: A Complete Guide for Performing Se - GOOD
The Security Risk Assessment Handbook: A Complete Guide for Performing Se - GOOD

$14.13

View Details
Security and Access Control Using Biometric Technologies by Newman, Robert
Security and Access Control Using Biometric Technologies by Newman, Robert

$18.80

View Details
Introduction to Emergency Management, Second Edition (Butterworth-He - VERY GOOD
Introduction to Emergency Management, Second Edition (Butterworth-He - VERY GOOD

$8.31

View Details
Information Security:  Contemporary Cases - Paperback By Wright, Marie A. - GOOD
Information Security: Contemporary Cases - Paperback By Wright, Marie A. - GOOD

$5.98

View Details