نتایج جستجو

Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier, 1994
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier, 1995
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Bruce Schneier, 1995
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Bruce Schneier, 1995
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Bruce Schneier, 1995
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Bruce Schneier, 1995
Beyond Fear
Bruce Schneier, 2003
Carry On: Sound Advice from Schneier on Security
Bruce Schneier, 2013
Cryptographie appliquee French
Bruce Schneier
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier, 2015
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
Bruce Schneier, 2015
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Bruce Schneier, 2012
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Bruce Schneier, 2012
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Bruce Schneier, 2012
Schneier on Security
Bruce Schneier, 2008
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier, 2004
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier, 2004
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
Bruce Schneier, 1999
Convincing Ground: Learning to Fall in Love With Your Country
Bruce Pascoe, 2007
Coping and Health
J. Bruce Overmier, 1980
School District Leadership Matters
Dr. Bruce Sheppard, 2009
The Exstrophy—Epispadias Complex: Research Concepts and Clinical Applications
Bruce Slaughenhoupt (auth.), 1999