demystifying the ipsec puzzle
|
|
demystifying the ipsec puzzle
|
techniques and applications of digit...
|
|
techniques and applications of digital watermarking and content protection /
|
user's guide to cryptography and sta...
|
|
user's guide to cryptography and standards
|
developing secure distributed system...
|
|
developing secure distributed systems with corba
|
security in wireless lans and mans
|
|
security in wireless lans and mans
|
defense and detection strategies aga...
|
|
defense and detection strategies against internet worms
|
outsourcing information security
|
|
outsourcing information security
|
role-based access controls
|
|
role-based access controls
|
computer and intrusion forensics
|
|
computer and intrusion forensics
|
multicast and group security
|
|
multicast and group security
|
privacy protection and computer fore...
|
|
privacy protection and computer forensics
|
contemporary cryptography
|
|
contemporary cryptography
|
electronic payment systems for e-com...
|
|
electronic payment systems for e-commerce /
|
|
bluetooth security
|
techniques and applications of digit...
|
|
techniques and applications of digital watermarking and content protection
|
electronic payment systems for e-com...
|
|
electronic payment systems for e-commerce
|
security fundamentals for e-commerce
|
|
security fundamentals for e-commerce
|
security technologies for the world ...
|
|
security technologies for the world wide web
|
information hiding techniques for st...
|
|
information hiding techniques for steganography and digital watermarking
|
implementing electronic card payment...
|
|
implementing electronic card payment systems
|