Skip to main content
Search
Connect
Hannawald
@hannawald
0
followers
Follow
Videos
Playlists
Most recent
Most recent
Most viewed
0:05
Download Pervasive Wireless Environments: Detecting and Localizing User Spoofing (SpringerBriefs
10 years ago
0:07
Read Security Protocols: 12th International Workshop Cambridge UK April 26-28 2004. Revised
10 years ago
0:07
Read Engineering Secure Software and Systems: 7th International Symposium ESSoS 2015 Milan
10 years ago
0:05
Read Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization Authentication
10 years ago
0:08
Read Progress in Cryptology - INDOCRYPT 2006: 7th International Conference on Cryptology in
10 years ago
0:07
Download Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques
10 years ago
0:05
Read Advances in Cryptology - EUROCRYPT 2008: 27th Annual International Conference on the Theory
10 years ago
0:08
Read Security Engineering for Cloud Computing: Approaches and Tools (Premier Reference Source)
10 years ago
0:05
Read IT Security Governance Guidebook with Security Program Metrics on CD-ROM (The CISO Toolkit)
10 years ago
0:08
Read Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer
10 years ago
0:06
Read Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking) PDF
10 years ago
0:06
Read Security Protocols: 10th International Workshop Cambridge UK April 17-19 2002 Revised
10 years ago
0:05
Download Secure Broadcast Communication: In Wired and Wireless Networks PDF Online
10 years ago
0:05
Read Handbook of Security and Networks Ebook Free
10 years ago
0:06
Read Formal Correctness of Security Protocols (Information Security and Cryptography) Ebook
10 years ago
0:05
Read Trojans Worms and Spyware: A Computer Security Professional's Guide to Malicious Code
10 years ago
0:08
Download Handbook of Research on Wireless Security Ebook Free
10 years ago
0:06
Read Progress in Cryptology -- AFRICACRYPT 2012: 5th International Conference on Cryptology
10 years ago
0:08
Read Bundle: Computer Forensic: Investigation Procedures and Response + Computer Forensics:
10 years ago
0:08
Read A Technical Guide to IPSec Virtual Private Networks Ebook Free
10 years ago
0:05
Read IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement Ebook
10 years ago
0:05
Read 70-298 Designing Security for a MS Win2003 Network: Microsoft Official Academic Course
10 years ago
0:08
Read Handbook of Financial Cryptography and Security (Chapman & Hall/CRC Cryptography and Network
10 years ago
0:07
Read Provable Security: Third International Conference ProvSec 2009 Guangzhou China November
10 years ago
0:05
Read Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider
10 years ago
0:07
Read Implementing Homeland Security for Enterprise IT Ebook Free
10 years ago
0:08
Read Group Theoretic Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)
10 years ago
0:06
Read Enterprise Mobility Management: Everything you need to know about MDM MAM and BYOD 2013
10 years ago
0:08
Read Data Management for Mobile Computing (Advances in Database Systems) Ebook Free
10 years ago
0:07
Read Engineering Secure Two-Party Computation Protocols: Design Optimization and Applications
10 years ago