GPJ

Vis mig kun

Securing the Nation's Critical Infrastructures

Securing the Nation's Critical Infrastructures

Spaniel, Drew

802,25 DKK

Understanding Blockchain and Cryptocurrencies

Understanding Blockchain and Cryptocurrencies

Summers, Akira

436,85 DKK

Cybersecurity Blue Team Strategies

Cybersecurity Blue Team Strategies

Nikolaos Thymianis, Thymianis

189,38 DKK

Crypto Wars

Crypto Wars

Jarvis, Craig

265,81 DKK

What To Do When You Get Hacked

What To Do When You Get Hacked

Brathwaite, Shimon

343,95 DKK

Next-Generation Enterprise Security and Governance

Next-Generation Enterprise Security and Governance

Haskell-Dowland, Paul

802,25 DKK

Cryptography and Network Security

Cryptography and Network Security

Alencar, Marcelo Sampaio de

802,25 DKK

Recent Trends in Blockchain for Information Systems Security and Privacy

Recent Trends in Blockchain for Information Systems Security and Privacy

Abraham, Ajith

436,85 DKK

PCI Compliance

PCI Compliance

Adamson, James

403,64 DKK

Securing the Nation's Critical Infrastructures

Securing the Nation's Critical Infrastructures

Spaniel, Drew

802,25 DKK

Cryptoeconomics

Cryptoeconomics

Xu, Wei

546,47 DKK

Blockchain Technology and Applications

Blockchain Technology and Applications

Surianarayanan, Chellammal

692,63 DKK

Cryptography for Developers

Cryptography for Developers

Denis, Tom St

366,80 DKK

Blockchain, Big Data and Machine Learning

Blockchain, Big Data and Machine Learning

Balamurugan, B.

473,39 DKK

Bent Functions

Bent Functions

Tokareva, Natalia

509,93 DKK

Digital Media Steganography

Digital Media Steganography

Hassaballah, Mahmoud

1021,49 DKK

Cyber Security and IT Infrastructure Protection

Cyber Security and IT Infrastructure Protection

Vacca, John R.

302,96 DKK

Java Cryptography Extensions

Java Cryptography Extensions

Weiss, Jason R.

192,41 DKK

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Syngress

288,10 DKK

Is It Shakespeare's Confession?

Is It Shakespeare's Confession?

Browne, Herbert Janvrin

59,77 DKK

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS

Hijazi, Rami

329,95 DKK

Principles of Computer Security Lab Manual, Fourth Edition

Principles of Computer Security Lab Manual, Fourth Edition

Conklin, Wm. Arthur

359,43 DKK

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Syngress

288,10 DKK

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS

Hijazi, Rami

329,95 DKK

Principles of Computer Security Lab Manual, Fourth Edition

Principles of Computer Security Lab Manual, Fourth Edition

Conklin, Wm. Arthur

359,43 DKK

Cryptography: A Very Short Introduction

Cryptography: A Very Short Introduction

Murphy, Sean

57,30 DKK

Marginal Acrostics and Other Alphabetical Devices

Marginal Acrostics and Other Alphabetical Devices

Booth, William Stone

68,60 DKK

Studies in the Bi-Literal Cipher of Francis Bacon

Studies in the Bi-Literal Cipher of Francis Bacon

Fiske, Gertrude Horsford

85,76 DKK

Fundamental Principles of the Baconian Ciphers, and Application to Books of the Sixteenth and Seventeenth Centuries

Fundamental Principles of the Baconian Ciphers, and Application to Books of the Sixteenth and Seventeenth Centuries

Fabyan, George

68,60 DKK

Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key

Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key

Falconer, John

77,76 DKK