BookOwl
ExploreTry BookOwl Free

Unknown Author

25 books on BookOwl

Software engineeringEngineeringArms raceRadio frequencyComputer scienceData encryption (Computer science)Computer Communication NetworksData protectionSystems and Data SecurityData Encryption

Books by Unknown Author

Cover of Cloud Computing Security

Cloud Computing Security

2022

Cover of Continuing Arms Race

Continuing Arms Race

2018

Cover of Continuing Arms Race

Continuing Arms Race

2018

Cover of Continuing Arms Race

Continuing Arms Race

2018

Cover of Continuing Arms Race

Continuing Arms Race

2018

Cover of Applied Cryptography and Network Security

Applied Cryptography and Network Security

2016

Cover of Automated Software Diversity

Automated Software Diversity

2015

Cover of Physically Unclonable Functions

Physically Unclonable Functions

2015

Cover of Automated Software Diversity

Automated Software Diversity

2015

Cover of Building Secure Defenses Against Code-Reuse Attacks

Building Secure Defenses Against Code-Reuse Attacks

2015

Cover of Building Secure Defenses Against Code-Reuse Attacks

Building Secure Defenses Against Code-Reuse Attacks

2015

Cover of Trusted Embedded Systems Based

Trusted Embedded Systems Based

2014

Cover of Physically Unclonable Functions

Physically Unclonable Functions

2014

Cover of Radio Frequency Identification : Security and Privacy Issues

Radio Frequency Identification : Security and Privacy Issues

2014

Cover of Ccs'13

Ccs'13

2013

Cover of CCS'13 Vol. 1 of 2

CCS'13 Vol. 1 of 2

2013

Cover of CCS'13

CCS'13

2013

Cover of ACM Sigsac CD-ROM 2013-2014

ACM Sigsac CD-ROM 2013-2014

2013

Cover of Towards Hardware-Intrinsic Security

Towards Hardware-Intrinsic Security

2013

Cover of Financial Cryptography and Data Security

Financial Cryptography and Data Security

2013

Cover of Financial Cryptography and Data Security

Financial Cryptography and Data Security

2013

Cover of Cryptology and Network Security

Cryptology and Network Security

2012

Cover of Trust and Trustworthy Computing

Trust and Trustworthy Computing

2011

Cover of Information Hiding

Information Hiding

2009

Cover of Research in Cryptology

Research in Cryptology

2008

Track this book with BookOwl

Free on iOS and web. No credit card required.

Try BookOwl Free
PrivacyTermsSupport

© 2026 BookOwl. All rights reserved.