Information Security Science

Measuring the Vulnerability to Data Compromises

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Big bigCover of Information Security Science

More books from Elsevier Science

bigCover of the book Perinatal Stem Cells by
bigCover of the book Designing Embedded Systems with PIC Microcontrollers by
bigCover of the book Understanding the Basics of QSAR for Applications in Pharmaceutical Sciences and Risk Assessment by
bigCover of the book Advanced Well Completion Engineering by
bigCover of the book High Temperature Oxidation and Corrosion of Metals by
bigCover of the book Multiphase Fluid Flow in Porous and Fractured Reservoirs by
bigCover of the book Sketches of Nature by
bigCover of the book Peanuts: Processing Technology and Product Development by
bigCover of the book A Practical Guide to Writing a Ruth L. Kirschstein NRSA Grant by
bigCover of the book Research Funding in Neuroscience by
bigCover of the book Cloud Computing by
bigCover of the book Nanobiomaterials in Hard Tissue Engineering by
bigCover of the book A Study Of Performance Measurement In The Outsourcing Decision by
bigCover of the book The Science of Fitness by
bigCover of the book Physiology of the Cladocera by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy