1-24 of 132 Books

Security protocols
By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe
Data Privacy for the Smart Grid
Data Privacy for the Smart Grid
By Rebecca Herold,Christine Hertzog
Seaports and development
Seaports and development
By Hoyle, B. S.

Web Security & Commerce
By Simson Garfinkel,Gene Spafford

Disclosure in Health and Illness
By Davis, Mark,Lenore Manderson

The practical guide to HIPAA privacy and security compliance
By Kevin Beaver

Collaborative access to virtual museum collection information
By Bernadette G. Callery

Handbook of applied cryptography
By Alfred J. Menezes
Integrating a Usable Security Protocol into User Authentication Services Design Process
Integrating a Usable Security Protocol into User Authentication Services Design Process
By Ahmed Seffah,Christina Braz,Syed Naqvi
Access and Control in Digital Humanities
Access and Control in Digital Humanities
By Shane Hawkins

Access Control, Security, and Trust
By Shiu-Kai Chin,Susan Beth Older

Practical UNIX Security
By Simson Garfinkel,Gene Spafford

Mechanics of user identification and authentication
By Dobromir Todorov

Introduction to broadband communication systems
By Cajetan M. Akujuobi
Attribute-Based Encryption and Access Control
Attribute-Based Encryption and Access Control
By Dijiang Huang,Qiuxiang Dong,Zhu, Yan

Medical records use and abuse
By Heidi Tranberg,Jem Rashbass

Identity Management for Internet of Things
By Parikshit N. Mahalle,Poonam N. Railkar

Complete guide to security and privacy metrics
By Debra S. Herrmann

The state of the art in intrusion prevention and detection
By Al-Sakib Khan Pathan
Archival Silences
Archival Silences
By Michael S. Moss,David Thomas