Primality Testing and Integer Factorization in Public-Key Cryptography كتب أخرى بهذه السلسلة

Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
٢٠٠٩
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
٢٠١٦
Security for Telecommunications Networks Security for Telecommunications Networks
٢٠٠٨
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
٢٠٠٧
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
٢٠١٥
Network Security Policies and Procedures Network Security Policies and Procedures
٢٠٠٧
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
٢٠٢٣
Artificial Intelligence for Cybersecurity Artificial Intelligence for Cybersecurity
٢٠٢٢
Cyber Threat Intelligence Cyber Threat Intelligence
٢٠١٨
Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
٢٠١٥
Spyware and Adware Spyware and Adware
٢٠١٠
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
٢٠٢٥
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
٢٠٢٤
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
٢٠٢٤
Blockchains Blockchains
٢٠٢٤