-
Security technologies for the World Wide Web
-
Advances in Security Technology : International Conference, SecTech 2008, and Its Special Sessions. Sanya, hainan Island, China, December 2008. Revised Selected Papers /
-
Security protocols : International workshop : Konf. Cambridge, UK, 10.- 12. April 1996 /
-
Hacker proof. The ultimate guide to network security
-
Hacker Proof : Váš počítač,vaše síť a vaše připojení na Internet. Je to opravdu bezpečné?
-
Information Security Principles and Practice
-
Information security and privacy. First australasian conference : Proceedings. ACISP ' 96 : Wollogonf, NSW, Australia. 24.- 26. June 1996
-
Information security and privacy. Proceedings: Third Australasian conference : ACISP' 98. Brisbane, Australia. 13.- 15. July 1999
-
Information security and privacy. Proceedings:Second australasian conference : ACISP '97 : Sydney, NSW, Australia, 7.- 9. July 1997
-
Information Security Theory and Practices. : Smart Cardf, Mobile and Ubiquitous Computing Systems. First IFIP TC6/WG8.8/WG 11.2 International Workshop, WISTP 2007. Proceedings. Heraklien, Grete, Greece. 9.-11. May 2007 /
-
Advances in Cryptology - ASIACRYPT ´99. International Conference on the Theory and Application of Cryptology and Information Security : Proceedings. Singapore, November 14-18, 1999
-
Advances in Cryptology - ASIACRYPT 2002. 8th International Conference on the Theory and Application of Cryptology and Information Security : Proceedings. New Zealand, December 1-5, 2002 /
-
Advances in Cryptology - ASIACRYPT 2009. 15th International Conference on the Theory and Application of Cryptology and Information Security : Proceedings, Tokyo, Japan, December 6-10, 2009 /
-
Advances in Cryptology - ASIACRYPT 2000. 6th International Conference on the Theory and Applications of Cryptology and Information Security : Proceedings, Kyoto, Japan, December 3-7, 2000 /
-
Advances in Cryptology - ASIACRYPT 2006. 12th International Conference on the Theory and Applications of Cryptology and Information Security : Proceedings, Shanghai, China, December 3-7, 2006 /
-
Advances in Cryptology - ASIACRYPT 2007. 13th International Conference on the Theory and Application of Cryptology and Information Security : Proceedings, Kuching, Malaysia, December 2-6, 2007 /
-
Advances in Cryptology - ASIACRYPT 2008. 14th International Conference on the Theory and Applications of Cryptology and Information Security : Proceedings, Melbourne, Australia, December 7-11, 2008 /
-
Advances in Cryptology - ASIACRYPT 2003. 9th International Conference on the Theory and Applications of Cryptology and Information Security : Proceedings, Taipei, Taiwan, 30. November-4. December, 2003 /
-
Advances in Cryptology - ASIACRYPT 2001. 7th International Conference on the Theory and Applications of Cryptology and Information Security : Proceedings, Gold Coast, Australia, December 9-13, 2001 /
-
Advances in Cryptology - ASIACRYPT 2005. 11th International Conference on the Theory and Applications of Cryptology and Information Security : Proceedings, Jeju Island, Korea, December 4-8, 2005 /
-
Advances in Cryptology - ASIACRYPT 2004. 10th International Conference on the Theory and Applications of Cryptology and Information Security : Proceedings, Jeju Island, Korea, December 5-9, 2004 /
-
WEB security : a step-by-step reference guide
-
SSL, DROWN útoky
-
Financial cryptography and data security. 9th international conference : FC 2005. Rosenau, The Commonwealth of Dominica. 28. Feb.- 3, March, Revised papers /
-
Bezpečnost v Linuxu prevence a odvracení napadení systému
-
Zranitelný kód
-
PGP : Pretty good privaci : Šifrování pro každého
-
Hacker Proof : Váš počítač,vaše síť a vaše připojení na Internet. Je to opravdu bezpečné?
-
Ochrana dat v informačných systémech
-
Bezpečnost v UNIXu a Internetu v praxi
-
Firewally - princípy budování a udržování
-
Hacking bez tajemství : Windows 2000
-
Dátové siete : Štandardy, protokoly, služby, bezpečnosť a ochrana dát /
-
The computer virus handbook /
-
Bezpečnost sítí : Velká kniha /
-
Bezpečnost sítí na maximum
-
Cryptography and network security : Principles and practices
-
Bezpečnost Windows 2000/XP : Bezpečnost od A do Z
-
Applied cryptography : Protocols, algorithms, and source code in C
-
Secrets and lies : Digital security in a networked world
-
Coloured Petri nets. Vol.2 : Analysis methods /
-
Cryptography:. An introduction to computer security /
-
Implementing Internet security
-
Security technologies for the World Wide Web
-
Hack proofing your network : Internet tradecraft
-
Počítačový program a právo
-
Sixth Annual computer security applications conference : Konf. Tuscon, USA, 3.- 7. dec. 1990
-
Data communications, networks, and systems /