|
Learning Korean With a Smile: Reading & Writing Hangeul
by
3.96 avg rating — 23 ratings
—
published
2012
—
3 editions
|
|
|
Secure Broadcast Communication: In Wired and Wireless Networks
by
2.67 avg rating — 3 ratings
—
published
2002
—
6 editions
|
|
|
Computer Security on the Edge
by
it was amazing 5.00 avg rating — 1 rating
—
published
2007
|
|
|
Learning Korean With a Smile -Reading & Writing-
by
it was amazing 5.00 avg rating — 1 rating
—
3 editions
|
|
|
Learning Korean With a Smile
by
it was amazing 5.00 avg rating — 1 rating
|
|
|
Secure Distributed Data Aggregation
by
it was amazing 5.00 avg rating — 1 rating
—
published
2011
—
2 editions
|
|
|
Bootstrapping Trust in Modern Computers
by
really liked it 4.00 avg rating — 1 rating
—
published
2011
—
6 editions
|
|
|
SCION: A Secure Internet Architecture
by
|
|
|
Learning Korean With a Smile (Easy to Learn Korean From Very Basic) Quick Start Guide Workbook
by
0.00 avg rating — 0 ratings
|
|
|
SCION: A Secure Internet Architecture
by
0.00 avg rating — 0 ratings
|
|
|
SCION: A Secure Internet Architecture
by
0.00 avg rating — 0 ratings
|
|
|
StackPi: A new defense mechanism against IP spoofing and DDoS attacks
by
0.00 avg rating — 0 ratings
|
|
|
Rees, Leanne M.
by
0.00 avg rating — 0 ratings
|
|
|
Learning Korean with a Smile: Reading and Writing Hangeul by Perrig, Adrian, Yu, Ah-Yeong, Lee, Heejo, Yim, Yeon published by CreateSpace Independent Publishing Platform (2012)
by
0.00 avg rating — 0 ratings
|
|
|
Securing Wireless Sensor Networks
by
0.00 avg rating — 0 ratings
—
published
2009
|
|
|
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings (Lecture Notes in Computer Science, 6740)
by
0.00 avg rating — 0 ratings
—
published
2011
—
4 editions
|
|
|
Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
by
0.00 avg rating — 0 ratings
—
published
2014
—
2 editions
|
|
|
The Complete Guide to SCION: From Design Principles to Formal Verification
by
|
|
|
Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Lecture Notes in Computer Science Book 8267)
by
0.00 avg rating — 0 ratings
|
|
|
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings (Lecture Notes in Computer Science Book 6740)
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.