Search alternatives:
computers security » computer security
computing security » computer security, computing series
1
Published 2005
Subjects: ...Computer networks Security measures Congresses....
Book
2
by Kizza, Joseph Migga,
Published 2015
Table of Contents: ...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...
Book
3
Published 2003
Table of Contents: ...ForNet: A Distributed Forensics Network /...
Book
4
Published 2015
Table of Contents: ....-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio...
Book
5
by Kizza, Joseph Migga,
Published 2005
Table of Contents: ...Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network...
Book
6
by Kizza, Joseph Migga,
Published 2017
Table of Contents: ...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...
Book
7
Published 2003
Subjects: ...Computer networks Security measures Congresses....
Access to the SpringerLink online version restricted; authentication may be required:
Electronic
8
9
Published 1982
Subjects: ...Computer security Periodicals....
Journal
10
Published 1999
Table of Contents: ...Secure transport of authentication data in third generation mobile phone networks / Stefan Pütz...
Book
11
by Baumgart, Rainer,
Published 1999
Table of Contents: ... -- Network Security (Workshop Notes) -- On Privacy Issues of Internet Access Services via Proxy Servers...
Book
12
Published 2009
Table of Contents: ...Overview of system and network security : a comprehensive introduction /...
Book
13
by Summers, Rita C.
Published 1997
Table of Contents: ...The Context for Computer Security --...
Book
14
Published 2008
Subjects: ...Computer networks Security measures....
Book
15
Published 2014
Table of Contents: ...Security and privacy in networked systems -- Authentication and access control systems...
Book
16
by Lehtinen, Rick.
Published 2006
Table of Contents: ...Introduction -- Some security history -- Computer system security and access controls -- Viruses...
Book
17
by Pfleeger, Charles P., 1948-
Published 1997
Table of Contents: ...1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure...
Book
18
...Nowadays, miscellaneous towards computer network can always be read through newspaper and be seen...
Get full text
Get full text
Conference or Workshop Item
19
by Gumel, Lawan Ahmed
Published 1999
... of threats and vulnerabilities to computer networks are outlined as well as network security objectives...
Get full text
Get full text
Thesis
20
Subjects: ...Computer networks Security measures Periodicals....
Access to the ScienceDirect online version restricted (authentication may be required):
Journal