Introduction to Cryptography and Network Security
Behrouz A. Forouzan
Making and Shaping the Law of Armed Conflict
Sandesh Sivakumaran & Christian R. Burne
Michigan Trual Court Administration
jis user
Cross-Industry Applications of Cyber Security Frameworks
Baral, Sukanta Kumar & Goel, Richa & Rahman, Md Mashiur & Sultan, Jahangir & Jahan, Sarkar
The Global Human Resource Management Casebook
Liza Castro Christiansen & Michal Biron & Pawan Budhwar & Brian Harney