Results
|
301.
|
|
Image from Amazon.com
|
|
|
302.
|
|
Image from Amazon.com
|
|
|
303.
|
|
Image from Amazon.com
|
|
|
304.
|
|
Image from Amazon.com
|
|
|
305.
|
|
Image from Amazon.com
|
|
|
306.
|
|
Image from Amazon.com
|
|
|
307.
|
|
Image from Amazon.com
|
|
|
308.
|
|
Image from Amazon.com
|
|
|
309.
|
|
Image from Amazon.com
|
|
|
310.
|
|
Image from Amazon.com
|
|
|
311.
|
|
Image from Amazon.com
|
|
|
312.
|
|
Image from Amazon.com
|
|
|
313.
|
|
Image from Amazon.com
|
|
|
314.
|
|
Image from Amazon.com
|
|
|
315.
|
|
Image from Amazon.com
|
Information Security and Cryptology [electronic resource] : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers / edited by Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu. by Series: Lecture Notes in Computer Science ; 4990Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
316.
|
|
Image from Amazon.com
|
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks [electronic resource] : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings / edited by Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis. by Series: Lecture Notes in Computer Science ; 5019Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008
In:
Springer eBooks
Availability: No items available.
|
|
317.
|
|
Image from Amazon.com
|
|
|
318.
|
|
Image from Amazon.com
|
|
|
319.
|
|
Image from Amazon.com
|
|
|
320.
|
|
Image from Amazon.com
|
|