Search alternatives:
computing security » computing series
1
Published 2005
Subjects: ...Computer networks Security measures Congresses....
Book
2
by Kizza, Joseph Migga,
Published 2015
Table of Contents: ...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...
Book
3
Published 2003
Table of Contents: ...ForNet: A Distributed Forensics Network /...
Book
4
Published 2015
Table of Contents: ....-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio...
Book
5
by Kizza, Joseph Migga,
Published 2005
Table of Contents: ...Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network...
Book
6
by Kizza, Joseph Migga,
Published 2017
Table of Contents: ...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...
Book
7
Published 2003
Subjects: ...Computer networks Security measures Congresses....
Access to the SpringerLink online version restricted; authentication may be required:
Electronic
8
9
Published 1999
Table of Contents: ...Secure transport of authentication data in third generation mobile phone networks / Stefan Pütz...
Book
10
Published 1982
Subjects: ...Computer security Periodicals....
Journal
11
by Baumgart, Rainer,
Published 1999
Table of Contents: ... -- Network Security (Workshop Notes) -- On Privacy Issues of Internet Access Services via Proxy Servers...
Book
12
Published 2008
Subjects: ...Computer networks Security measures....
Book
13
Published 2009
Table of Contents: ...Overview of system and network security : a comprehensive introduction /...
Book
14
by Summers, Rita C.
Published 1997
Table of Contents: ...The Context for Computer Security --...
Book
15
Subjects: ...Computer networks Security measures Periodicals....
Access to the ScienceDirect online version restricted (authentication may be required):
Journal
16
Published 2014
Table of Contents: ...Security and privacy in networked systems -- Authentication and access control systems...
Book
17
...Nowadays, miscellaneous towards computer network can always be read through newspaper and be seen...
Get full text
Get full text
Conference or Workshop Item
18
by Gumel, Lawan Ahmed
Published 1999
... of threats and vulnerabilities to computer networks are outlined as well as network security objectives...
Get full text
Get full text
Thesis
19
by Lehtinen, Rick.
Published 2006
Table of Contents: ...Introduction -- Some security history -- Computer system security and access controls -- Viruses...
Book
20
by Pfleeger, Charles P., 1948-
Published 1997
Table of Contents: ...1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure...
Book