Author
user
Mobile Authentication: Problems and Solutions by Jakobsson, Markus by Springer
Source by thriftbooks
Dependable Computing for Critical Applications 3 by Springer
Source by thriftbooks
Vendor-Specific Vs. Vendor-Neutral Certification in Cloud Security
Source by madhwalpriyansha570
PrivacyPreserving Machine Learning by Li, Jin; Li, Ping; Liu, Zheli by Springer
Source by thriftbooks