The Science of Secrecy from Ancient Egypt to Quantum Cryptography
F…
Resultaten
The Science of Secrecy from Ancient Egypt to Quantum Cryptography
F…
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of th…
The world's most infamous hacker offers an insider's view of the low-tech th…
“Perry’s exploration of security as a cultural force, created by proce…
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study…