by Matt Bishop
No reviews yet. Be the first!
Applying the take-grant protection model
Information Security Education Across th...
A security analysis of version 2 of the ...
An overview of computer viruses in a res...
Information Security Education for a Glo...
Boy Made the Difference
Financial audit
Financial Management
Digital Fortress
Advances in Computers, Volume 49 (Advanc...
Hacking for Dummies
Air traffic control