Women in American politics [electronic resource] : history and milestones / Doris Weatherford.
By: Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 9781452234441 (ebook) :
- 324.0820973 23
- HQ1236.5.U6 W43 2012
No physical items for this record
Includes bibliographical references and index.
-
1
Applied cryptography :
by Schneier, Bruce, -
2
Practical cryptography /
by Ferguson, Niels. -
3
Web hacking :
by McClure, Stuart. -
4
Internet security professional reference /
-
5
Internet security :
by Kyas, Othmar. -
6
Internet security :
-
7
Enhancing computer security with smart technology
-
8
Investigator's guide to steganography
by Kipper, Gregory. -
9
Unauthorized access
by Sloan, Robert H. -
10
Network anomaly detection :
by Bhattacharyya, Dhruba K., -
11
Discrete dynamical systems and chaotic machines
by Bahi, Jacques Mohcine. -
12
Cryptanalysis of RSA and its variants
by Hinek, M. Jason. -
13
Security and policy driven computing
by Liu, Lei, -
14
Data mining and machine learning in cybersecurity
by Dua, Sumeet. -
15
RC4 stream cipher and its variants
by Paul, Goutam. -
16
Data mining tools for malware detection
by Masud, Mehedy. -
17
Computer security literacy
by Jacobson, Douglas. -
18
Machine learning forensics for law enforcement, security, and intelligence
by Mena, Jesus. -
19
Honeypot
by Joshi, R. C. -
20
Software test attacks to break mobile and embedded devices /
by Hagar, Jon Duncan,
There are no comments on this title.