𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Computer and Information Security Handbook || Verifiable Voting Systems

✍ Scribed by Peacock, Thea


Book ID
120606469
Publisher
Elsevier
Year
2013
Weight
638 KB
Category
Article
ISBN
0123943973

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


Computer and Information Security Handbo
✍ Gurkok, Cem 📂 Article 📅 2013 🏛 Elsevier 🌐 English ⚖ 857 KB

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent adv

Computer and Information Security Handbo
✍ Day, Christopher 📂 Article 📅 2013 🏛 Elsevier 🌐 English ⚖ 839 KB

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent adv

Computer and Information Security Handbo
✍ Agostino Ardagna, Claudio 📂 Article 📅 2013 🏛 Elsevier 🌐 English ⚖ 40 KB

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent adv

Computer and Information Security Handbo
✍ Kupwade Patil, Harsh 📂 Article 📅 2013 🏛 Elsevier 🌐 English ⚖ 761 KB

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent adv

Computer and Information Security Handbo
✍ , 📂 Article 📅 2013 🏛 Elsevier 🌐 English ⚖ 165 KB

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent adv