|
The Internet of Risky Things: Trusting the Devices That Surround Us
by
really liked it 4.00 avg rating — 20 ratings
—
4 editions
|
|
|
Craft of System Security, The
by
really liked it 4.00 avg rating — 18 ratings
—
published
2003
—
7 editions
|
|
|
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security, 39)
by
3.14 avg rating — 7 ratings
—
published
2008
—
5 editions
|
|
|
Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science, 6101)
by
4.50 avg rating — 2 ratings
—
published
2010
—
4 editions
|
|
|
Who Is Watching While They Pray? : The Role of Tod
by
really liked it 4.00 avg rating — 2 ratings
—
published
2013
—
3 editions
|
|
|
Trusted Computing Platforms: Design and Applications
by
liked it 3.00 avg rating — 1 rating
—
published
2004
—
7 editions
|
|
|
Trusted Computing Platforms: Design and Applications
by
0.00 avg rating — 0 ratings
|
|
|
Signed Vector Timestamps: A Secure Protocol for Partial Order Time. Revision
by
0.00 avg rating — 0 ratings
|
|
|
Trusted Computing Platforms
by
0.00 avg rating — 0 ratings
|
|
|
The Craft of System Security by Sean Smith John Marchesini(2007-12-01)
by
0.00 avg rating — 0 ratings
|
|
|
Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings (Lecture Notes in Computer Science Book 6101)
by
0.00 avg rating — 0 ratings
|
|
|
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security Book 39)
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.