GPJ

Vis mig kun

What To Do When You Get Hacked

What To Do When You Get Hacked

Brathwaite, Shimon

343,95 DKK

Next-Generation Enterprise Security and Governance

Next-Generation Enterprise Security and Governance

Haskell-Dowland, Paul

802,25 DKK

Recent Trends in Blockchain for Information Systems Security and Privacy

Recent Trends in Blockchain for Information Systems Security and Privacy

Abraham, Ajith

436,85 DKK

PCI Compliance

PCI Compliance

Adamson, James

403,64 DKK

Securing the Nation's Critical Infrastructures

Securing the Nation's Critical Infrastructures

Spaniel, Drew

802,25 DKK

Cryptoeconomics

Cryptoeconomics

Xu, Wei

546,47 DKK

Blockchain Technology and Applications

Blockchain Technology and Applications

Surianarayanan, Chellammal

692,63 DKK

Cryptography for Developers

Cryptography for Developers

Denis, Tom St

366,80 DKK

Blockchain, Big Data and Machine Learning

Blockchain, Big Data and Machine Learning

Balamurugan, B.

473,39 DKK

Bent Functions

Bent Functions

Tokareva, Natalia

509,93 DKK

Digital Media Steganography

Digital Media Steganography

Hassaballah, Mahmoud

1021,49 DKK

Cyber Security and IT Infrastructure Protection

Cyber Security and IT Infrastructure Protection

Vacca, John R.

302,96 DKK

Java Cryptography Extensions

Java Cryptography Extensions

Weiss, Jason R.

192,41 DKK

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Syngress

288,10 DKK

Is It Shakespeare's Confession?

Is It Shakespeare's Confession?

Browne, Herbert Janvrin

59,77 DKK

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS

Hijazi, Rami

329,95 DKK

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Syngress

288,10 DKK

Data Hiding Techniques in Windows OS

Data Hiding Techniques in Windows OS

Hijazi, Rami

329,95 DKK

Cryptography: A Very Short Introduction

Cryptography: A Very Short Introduction

Murphy, Sean

57,30 DKK

Marginal Acrostics and Other Alphabetical Devices

Marginal Acrostics and Other Alphabetical Devices

Booth, William Stone

68,60 DKK

Studies in the Bi-Literal Cipher of Francis Bacon

Studies in the Bi-Literal Cipher of Francis Bacon

Fiske, Gertrude Horsford

85,76 DKK

Fundamental Principles of the Baconian Ciphers, and Application to Books of the Sixteenth and Seventeenth Centuries

Fundamental Principles of the Baconian Ciphers, and Application to Books of the Sixteenth and Seventeenth Centuries

Fabyan, George

68,60 DKK

Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key

Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key

Falconer, John

77,76 DKK

Reader of Gentlemen's Mail

Reader of Gentlemen's Mail

David Kahn, Kahn

223,05 DKK

Bi-Literal Cypher of Francis Bacon

Bi-Literal Cypher of Francis Bacon

Gallup, Elizabeth Wells

59,77 DKK

Cryptography

Cryptography

Langie, Andre

546,47 DKK

New Testament Autographs

New Testament Autographs

Harris, J. Rendel

59,77 DKK

Manual for the Solution of Military Ciphers

Manual for the Solution of Military Ciphers

Hitt, Parker

68,60 DKK

Ciphers for the Little Folks

Ciphers for the Little Folks

Crain, Dorothy

59,77 DKK

Keys for Deciphering the Greatest Work of Sir Francis Bacon, Baron of Verulam, Viscount St. Alban

Keys for Deciphering the Greatest Work of Sir Francis Bacon, Baron of Verulam, Viscount St. Alban

Laboratories, Riverbank

68,60 DKK