Suggested Topics within your search.
Suggested Topics within your search.
1
2
Published 2005
Subjects:
“...Computer networks Security measures Congresses....”
Book
3
by Kizza, Joseph Migga,
Published 2015
Table of Contents:
“...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...”Published 2015
Book
4
Published 2003
Table of Contents:
“...ForNet: A Distributed Forensics Network /...”
Book
5
Published 2015
Table of Contents:
“....-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio...”
Book
6
by Kizza, Joseph Migga,
Published 2005
Table of Contents:
“...Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network...”Published 2005
Book
7
by Kizza, Joseph Migga,
Published 2017
Table of Contents:
“...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...”Published 2017
Book
8
Published 2003
Subjects:
“...Computer networks Security measures Congresses....”Access to the SpringerLink online version restricted; authentication may be required:
Electronic
9
Published 2003
Subjects:
“...Computer networks Security measures Congresses....”Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Serial
10
by Summers, Rita C.
Published 1997
Table of Contents:
“...The Context for Computer Security --...”Published 1997
Book
11
by Pfleeger, Charles P., 1948-
Published 1997
Table of Contents:
“...1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure...”Published 1997
Book
12
by Bishop, Matt.
Published 2003
Table of Contents:
“...pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access...”Published 2003
Book
13
Published 1999
Table of Contents:
“...Secure transport of authentication data in third generation mobile phone networks / Stefan Pütz...”
Book
14
Published 2009
Table of Contents:
“...Overview of system and network security : a comprehensive introduction /...”
Book
15
Published 2014
Table of Contents:
“...Security and privacy in networked systems -- Authentication and access control systems...”
Book
16
by Baumgart, Rainer,
Published 1999
Table of Contents:
“... -- Network Security (Workshop Notes) -- On Privacy Issues of Internet Access Services via Proxy Servers...”Published 1999
Book
17
by Lehtinen, Rick.
Published 2006
Table of Contents:
“...Introduction -- Some security history -- Computer system security and access controls -- Viruses...”Published 2006
Book
18
Computer Security — ESORICS 2002 : 7th European Symposium on Research in Computer Security Zurich...
Published 2002
Table of Contents:
“...Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality...”
Book
19
Published 2015
Subjects:
“...Computer networks Security measures Case studies....”
Book
20
Published 2017
Subjects:
“...Computer networks Security measures....”
Book


