Search alternatives:
computing security » computing series
1
Published 1982
Subjects: ...Computer security Periodicals....
Journal
2
Published 2005
Subjects: ...Computer networks Security measures Congresses....
Book
3
by Kizza, Joseph Migga,
Published 2015
Table of Contents: ...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...
Book
4
Published 2003
Table of Contents: ...ForNet: A Distributed Forensics Network /...
Book
5
Published 2015
Table of Contents: ....-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio...
Book
6
by Kizza, Joseph Migga,
Published 2005
Table of Contents: ...Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network...
Book
7
by Kizza, Joseph Migga,
Published 2017
Table of Contents: ...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...
Book
8
Published 2003
Subjects: ...Computer networks Security measures Congresses....
Access to the SpringerLink online version restricted; authentication may be required:
Electronic
9
10
by Summers, Rita C.
Published 1997
Table of Contents: ...The Context for Computer Security --...
Book
11
by Pfleeger, Charles P., 1948-
Published 1997
Table of Contents: ...1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure...
Book
12
by Bishop, Matt.
Published 2003
Table of Contents: ...pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access...
Book
13
Published 1999
Table of Contents: ...Secure transport of authentication data in third generation mobile phone networks / Stefan Pütz...
Book
14
Published 2009
Table of Contents: ...Overview of system and network security : a comprehensive introduction /...
Book
15
Published 2014
Table of Contents: ...Security and privacy in networked systems -- Authentication and access control systems...
Book
16
by Baumgart, Rainer,
Published 1999
Table of Contents: ... -- Network Security (Workshop Notes) -- On Privacy Issues of Internet Access Services via Proxy Servers...
Book
17
by Lehtinen, Rick.
Published 2006
Table of Contents: ...Introduction -- Some security history -- Computer system security and access controls -- Viruses...
Book
18
Published 2002
Table of Contents: ...Computational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality...
Book
19
Published 2015
Subjects: ...Computer networks Security measures Case studies....
Book
20
Published 2017
Subjects: ...Computer networks Security measures....
Book