Browse
Contact
/
Login
Upload
Search Results for 'Data Security And Cryptology Xvi'
Urgent Issues in Cyber Security
tatiana-dople
On the Knowledge Soundness of a Cooperative Provable Data P
trish-goza
Design of cyber security awareness game utilizing a social
min-jolicoeur
SPHINX: Detecting Security Attacks in Software-Defined Netw
kittie-lecroy
Empowering Youth Advocates with Data and Advocacy Skills
lois-ondreau
Windows Mobile Security:
marina-yarberry
Security and Privacy Issues in Wireless Communication
test
Lesson 2 : Internet, computer ethics and security
faustina-dinatale
Information Security in the Debt Collections Industry
min-jolicoeur
EZID data security and risks
trish-goza
Eight Tips for Reducing Fraud
tatiana-dople
BRINGING BIG DATA VISIBILITY TO NETWORK SECURITY From
calandra-battersby
Cryptology Digital Signatures and Digital Certificates
conchita-marotz
Building a scalable multi-tenanted
mitsue-stanley
Cryptography and Network Security
alexa-scheidler
SECURITY VISION IN W3C Judy Zhu (AB Mmeber, Alibaba Group)
marina-yarberry
Cryptography and Network Security
aaron
Homeland Security and
test
Security in the Internet of Things (IoT)
pasty-toler
Mobile Platform Security Models
phoebe-click
Defense Security Service
ellena-manuel
DCAF a centre for security,
lois-ondreau
Introduction to Computer Security
karlyn-bohler
Defense Security Service
mitsue-stanley
24
25
26
27
28
29
30
31
32
33
34