E-book Search
E-Book Title Author Publisher ISBN Copyright Year Status
Information Security and Privacy Ron SteinfeldPhilip Hawkes Springer _ 2010
Information Security and Privacy Colin BoydEd Dawson Springer _ 1998
Information Security and Privacy E. P. DawsonA. ClarkColin Boyd Springer _ 2000
Information Security and Privacy Udaya ParampalliPhilip Hawkes Springer _ 2011
Information Security and Privacy Yi MuWilly SusiloJennifer Seberry Springer _ 2008
Information Security and Privacy Josef PieprzykHossein GhodosiEd Dawson Springer _ 2007
Information Security and Privacy Vijay VaradharajanJosef PieprzykYi Mu Springer _ 1997
Information Security and Privacy Colin BoydJuan Gonz�lez Nieto Springer _ 2009
Information Security and Privacy Vijay VaradharajanYi Mu Springer _ 2001
Information Security and Privacy Rei Safavi-NainiJennifer Seberry Springer _ 2003
Information Security and Privacy Willy SusiloYi MuJennifer Seberry Springer 9783642314483 2012
Information Security and Privacy Lynn BattenJennifer Seberry Springer _ 2002
Information Security and Privacy Lynn Margaret BattenReihaneh Safavi-Naini Springer _ 2006
Information Security and Privacy Josef PieprzykJennifer Seberry Springer _ 1996
Information Security and Privacy Colin BoydJuan Manuel Gonz�lez Nieto Springer _ 2005
Information Security and Privacy Huaxiong WangJosef PieprzykVijay Varadharajan Springer _ 2004
Information Security Applications Souhwan JungMoti Yung Springer 9783642278907 2012
Information Security Applications Ki-Joon ChaeMoti Yung Springer _ 2004
Information Security Applications Kyo-Il ChungKiwook SohnMoti Yung Springer _ 2009
Information Security Applications Heung Youl YoumMoti Yung Springer _ 2009
Information Security Applications Jae Kwang LeeOkyeon YiMoti Yung Springer _ 2007
Information Security Applications Dong Hoon LeeMoti Yung Springer 9783642354168 2012
Information Security Applications Joo-Seok SongTaekyoung KwonMoti Yung Springer _ 2006
Information Security Applications Sehun KimMoti YungHyung-Woo Lee Springer _ 2007
Information Security Applications Chae Hoon LimMoti Yung Springer _ 2005

Contact Us