GPJ

Vis mig kun

Behavioral Cybersecurity

Behavioral Cybersecurity

Winston-Proctor, Cynthia E.

177,19 DKK

In-Depth Guide to Mobile Device Forensics

In-Depth Guide to Mobile Device Forensics

Easttom, Chuck

403,64 DKK

Crypto Wars

Crypto Wars

Jarvis, Craig

265,81 DKK

IoT Applications, Security Threats, and Countermeasures

IoT Applications, Security Threats, and Countermeasures

Ravichandran, P.

436,85 DKK

Modern Cryptography with Proof Techniques and Implementations

Modern Cryptography with Proof Techniques and Implementations

Lee, Wai Kong

403,64 DKK

AI and Deep Learning in Biometric Security

AI and Deep Learning in Biometric Security

Ramachandra, Raghavendra

436,85 DKK

Cybersecurity

Cybersecurity

Saini, Hemraj

436,85 DKK

Inside Blockchain, Bitcoin, and Cryptocurrencies

Inside Blockchain, Bitcoin, and Cryptocurrencies

Chowdhury, Niaz

403,64 DKK

Cryptography Apocalypse

Cryptography Apocalypse

Grimes, Roger A.

196,23 DKK

Modern Dimension Reduction

Modern Dimension Reduction

Waggoner, Philip D.

165,78 DKK

Channel Coding in Communication Networks

Channel Coding in Communication Networks

Glavieux, Alain

2190,77 DKK

Hacking Connected Cars

Hacking Connected Cars

Knight, Alissa

288,10 DKK

Computational Cryptography

Computational Cryptography

Stam, Martijn

25,00 DKK

Adaptive Inventories

Adaptive Inventories

Rossiter, Erin L.

165,78 DKK

Breaking Teleprinter Ciphers at Bletchley Park

Breaking Teleprinter Ciphers at Bletchley Park

Field, J. V.

1167,65 DKK

Competitive Programming in Python

Competitive Programming in Python

Vie, Jill-Jenn

302,96 DKK

Breaking Teleprinter Ciphers at Bletchley Park

Breaking Teleprinter Ciphers at Bletchley Park

Field, J. V.

1167,65 DKK

Topics in Structural Graph Theory

Topics in Structural Graph Theory

Wilson, Robin J.

1021,49 DKK

Agent-Based Models of Social Life

Agent-Based Models of Social Life

Laver, Michael

165,78 DKK

Cybersecurity in Humanities and Social Sciences

Cybersecurity in Humanities and Social Sciences

Aden, Hartmut

1313,81 DKK

Unsupervised Machine Learning for Clustering in Political and Social Research

Unsupervised Machine Learning for Clustering in Political and Social Research

Waggoner, Philip D.

165,78 DKK

Cracking Codes and Cryptograms For Dummies

Cracking Codes and Cryptograms For Dummies

Koltko-Rivera, Mark

61,42 DKK

Hacking Connected Cars

Hacking Connected Cars

Knight, Alissa

288,10 DKK

Competitive Programming in Python

Competitive Programming in Python

Vie, Jill-Jenn

302,96 DKK

Cryptography Apocalypse

Cryptography Apocalypse

Grimes, Roger A.

196,23 DKK

Information Theory and Coding by Example

Information Theory and Coding by Example

Suhov, Yuri

329,95 DKK

Trust and Privacy in Digital Business

Trust and Privacy in Digital Business

Lambrinoudakis, Costas

436,85 DKK

Public Key Cryptography - PKC 2003

Public Key Cryptography - PKC 2003

Desmedt, Yvo

436,85 DKK

Computer Security - ESORICS 2007

Computer Security - ESORICS 2007

Biskup, Joachim

875,33 DKK

Security and Cryptography for Networks

Security and Cryptography for Networks

Prisco, Roberto De

436,85 DKK