(2008). Hardware-based computer security techniques to defeat hackers: From biometrics to quantum cryptography. Wiley.
Chicago Style (17th ed.) CitationHardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Hoboken, N.J: Wiley, 2008.
MLA (9th ed.) CitationHardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Wiley, 2008.
Warning: These citations may not always be 100% accurate.