Ngā hua rapu

  • E whakaatu ana i te 1 - 9 hua o te 9
Whakamahine hua
  1. 1

    Brute Force Cracking the Data Encryption Standard / Curtin, Matt

    I whakaputaina 2005
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  2. 2

    Privacy and Identity Management for Life Camenisch, Jan

    I whakaputaina 2011
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  3. 3

    Managing Risk and Information Security Protect to Enable / Harkins, Malcolm

    I whakaputaina 2013
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  4. 4

    Building the Infrastructure for Cloud Security A Solutions view / Yeluri, Raghu, Castro-Leon, Enrique

    I whakaputaina 2014
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  5. 5
  6. 6
  7. 7

    The InfoSec Handbook An Introduction to Information Security / Rao, Umesh Hodeghatta, Nayak, Umesha

    I whakaputaina 2014
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  8. 8

    Platform Embedded Security Technology Revealed Ruan, Xiaoyu

    I whakaputaina 2014
    Whiwhi kuputuhi katoa
    Tāhiko īPukapuka
  9. 9