Skip to main content
Skip to footer
Search
Connect
Mlexer
@mlexer
0
followers
Follow
Videos
Playlists
Most recent
Most recent
Most viewed
0:08
Read Information and Communications Security: 15th International Conference ICICS 2013 Beijing
6/8/2016
0:08
Read Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization Authentication
6/8/2016
0:07
Read Provable Security: Third International Conference ProvSec 2009 Guangzhou China November
6/8/2016
0:05
Download Smart Card Security and Applications (Artech House Telecommunications Library) Ebook
6/8/2016
0:06
Read Security Protocols: 11th International Workshop Cambridge UK April 2-4 2003 Revised Selected
6/8/2016
0:08
Read Formal Correctness of Security Protocols (Information Security and Cryptography) Ebook
6/8/2016
0:07
Read Network and System Security: 8th International Conference NSS 2014 Xi'an China October
6/8/2016
0:06
Read Advances in Information Security and Its Application: Third International Conference ISA
6/8/2016
0:05
Read Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider
6/8/2016
0:08
Read Questioning the Politics of Numbers: How to Read and Critique Research by Wilkins Karin
6/8/2016
0:05
Read Engineering Secure Two-Party Computation Protocols: Design Optimization and Applications
6/8/2016
0:08
Read Desktop Witness: The Do's and Don'ts of Personal Computer Security Ebook Free
6/8/2016
0:07
Read Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference WISTP
6/8/2016
0:05
Read Advances in Computers Volume 60: Information Security Ebook Free
6/8/2016
0:07
Read Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
6/8/2016
0:07
Read Mainframe Basics for Security Professionals: Getting Started with RACF Ebook Free
6/8/2016
0:08
Read Advances in Cryptology -- EUROCRYPT 2011: 30th Annual International Conference on the
6/8/2016
0:06
Read Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory
6/8/2016
0:05
Read Network and System Security: 9th International Conference NSS 2015 New York NY USA November
6/8/2016
0:05
Read Stabilization Safety and Security of Distributed Systems: 17th International Symposium
6/8/2016
0:08
Read Security for Computer Networks: An Introduction to Data Security in Teleprocessing and
6/8/2016
0:08
Read Lectures on Data Security: Modern Cryptology in Theory and Practice (Lecture Notes in
6/8/2016
0:05
Read Introduction to Communication Electronic Warfare Systems (Artech House Information Warfare
6/8/2016
0:07
Read Protocols for Secure Electronic Commerce Second Edition (Advanced & Emerging Communications
6/8/2016
0:08
Read Configuring IPv6 for Cisco IOS Ebook Free
6/8/2016
0:05
Download Critical Information Infrastructures: Resilience and Protection Ebook Free
6/8/2016
0:05
Read Composition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture Notes in Computer
6/8/2016
0:07
Download An Introduction to ISO/IEC 27001:2013 PDF Free
6/8/2016
0:05
Read Post-Quantum Cryptography: Second International Workshop PQCrypto 2008 Cincinnati OH USA
6/8/2016