GPJ

Vis mig kun

Green Computing in Network Security

Green Computing in Network Security

Dwivedi, Rinky

436,85 DKK

Green Computing in Network Security

Green Computing in Network Security

Dwivedi, Rinky

436,85 DKK

Nanoelectronic Devices for Hardware and Software Security

Nanoelectronic Devices for Hardware and Software Security

Raj, Balwinder

436,85 DKK

Stuxnet to Sunburst

Stuxnet to Sunburst

Jenkinson, Andrew

273,24 DKK

Introduction to Cryptocurrencies

Introduction to Cryptocurrencies

Georgitseas, Panagiotis

329,95 DKK

Essential Enterprise Blockchain Concepts and Applications

Essential Enterprise Blockchain Concepts and Applications

Saini, Deepak Kumar

692,63 DKK

Security Hippie

Security Hippie

Engel, Barak

317,82 DKK

Behavioral Cybersecurity

Behavioral Cybersecurity

Winston-Proctor, Cynthia E.

177,19 DKK

In-Depth Guide to Mobile Device Forensics

In-Depth Guide to Mobile Device Forensics

Easttom, Chuck

403,64 DKK

Crypto Wars

Crypto Wars

Jarvis, Craig

265,81 DKK

IoT Applications, Security Threats, and Countermeasures

IoT Applications, Security Threats, and Countermeasures

Ravichandran, P.

436,85 DKK

Modern Cryptography with Proof Techniques and Implementations

Modern Cryptography with Proof Techniques and Implementations

Lee, Wai Kong

403,64 DKK

AI and Deep Learning in Biometric Security

AI and Deep Learning in Biometric Security

Ramachandra, Raghavendra

436,85 DKK

Cybersecurity

Cybersecurity

Saini, Hemraj

436,85 DKK

Inside Blockchain, Bitcoin, and Cryptocurrencies

Inside Blockchain, Bitcoin, and Cryptocurrencies

Chowdhury, Niaz

403,64 DKK

Cryptography Apocalypse

Cryptography Apocalypse

Grimes, Roger A.

196,23 DKK

Modern Dimension Reduction

Modern Dimension Reduction

Waggoner, Philip D.

165,78 DKK

Channel Coding in Communication Networks

Channel Coding in Communication Networks

Glavieux, Alain

2190,77 DKK

Hacking Connected Cars

Hacking Connected Cars

Knight, Alissa

288,10 DKK

Computational Cryptography

Computational Cryptography

Stam, Martijn

25,00 DKK

Adaptive Inventories

Adaptive Inventories

Rossiter, Erin L.

165,78 DKK

Breaking Teleprinter Ciphers at Bletchley Park

Breaking Teleprinter Ciphers at Bletchley Park

Field, J. V.

1167,65 DKK

Competitive Programming in Python

Competitive Programming in Python

Vie, Jill-Jenn

302,96 DKK

Breaking Teleprinter Ciphers at Bletchley Park

Breaking Teleprinter Ciphers at Bletchley Park

Field, J. V.

1167,65 DKK

Topics in Structural Graph Theory

Topics in Structural Graph Theory

Wilson, Robin J.

1021,49 DKK

Agent-Based Models of Social Life

Agent-Based Models of Social Life

Laver, Michael

165,78 DKK

Cybersecurity in Humanities and Social Sciences

Cybersecurity in Humanities and Social Sciences

Aden, Hartmut

1313,81 DKK

Unsupervised Machine Learning for Clustering in Political and Social Research

Unsupervised Machine Learning for Clustering in Political and Social Research

Waggoner, Philip D.

165,78 DKK

Cracking Codes and Cryptograms For Dummies

Cracking Codes and Cryptograms For Dummies

Koltko-Rivera, Mark

61,42 DKK

Hacking Connected Cars

Hacking Connected Cars

Knight, Alissa

288,10 DKK