GPJ

Vis mig kun

Foundations of Logic and Mathematics

Foundations of Logic and Mathematics

Nievergelt, Yves

436,85 DKK

Moving Target Defense

Moving Target Defense

Wang, X. Sean

802,25 DKK

Security and Privacy for Implantable Medical Devices

Security and Privacy for Implantable Medical Devices

Carrara, Sandro

875,33 DKK

Security for Cloud Storage Systems

Security for Cloud Storage Systems

Jia, Xiaohua

337,32 DKK

Information Assurance

Information Assurance

Kovacich, Gerald L.

692,63 DKK

Trustworthy Execution on Mobile Devices

Trustworthy Execution on Mobile Devices

Newsome, James

436,85 DKK

Embedded Multimedia Security Systems

Embedded Multimedia Security Systems

Zambreno, Joseph

875,33 DKK

Inside Cyber Warfare

Inside Cyber Warfare

Carr, Jeffrey

273,24 DKK

Forensic Computing

Forensic Computing

Jenkinson, Brian

692,63 DKK

Communication Networks for Smart Grids

Communication Networks for Smart Grids

Thottan, Marina

509,93 DKK

Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

Cheng, Yu

436,85 DKK

100 Ideas for Primary Teachers: Coding

100 Ideas for Primary Teachers: Coding

Martin Burrett, Burrett

139,13 DKK

Discrete Dynamical Systems and Chaotic Machines

Discrete Dynamical Systems and Chaotic Machines

Guyeux, Christophe

546,47 DKK

50 Codes that Changed the World

50 Codes that Changed the World

McKay, Sinclair

99,54 DKK

Expert Oracle Application Express Security

Expert Oracle Application Express Security

Spendolini, Scott

288,10 DKK

iOS Forensic Analysis

iOS Forensic Analysis

Campbell, Tony

473,39 DKK

Open Source Software for Digital Forensics

Open Source Software for Digital Forensics

Zanero, Stefano

1240,73 DKK

Artificial Intelligence and Security in Computing Systems

Artificial Intelligence and Security in Computing Systems

Drobiazgiewicz, Leszek

1240,73 DKK

Biometric Solutions

Biometric Solutions

Zhang, David D.

1240,73 DKK

Differential Cryptanalysis of the Data Encryption Standard

Differential Cryptanalysis of the Data Encryption Standard

Shamir, Adi

875,33 DKK

Building in Big Brother

Building in Big Brother

Hoffman, Lance J.

875,33 DKK

Synchronizing E-Security

Synchronizing E-Security

Williams, Godfried B.

875,33 DKK

Information Security Handbook

Information Security Handbook

Hunter, John M.

436,85 DKK

Economics of Financial and Medical Identity Theft

Economics of Financial and Medical Identity Theft

Johnson, M. Eric

436,85 DKK

Security and Privacy in Biometrics

Security and Privacy in Biometrics

Campisi, Patrizio

875,33 DKK

Advances in Cryptology

Advances in Cryptology

Chaum, David

436,85 DKK

Algebraic and Stochastic Coding Theory

Algebraic and Stochastic Coding Theory

Kythe, Prem K.

436,85 DKK

New Directions of Modern Cryptography

New Directions of Modern Cryptography

Cao, Zhenfu

436,85 DKK

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

Kahn, David

403,64 DKK

New Directions of Modern Cryptography

New Directions of Modern Cryptography

Cao, Zhenfu

436,85 DKK