Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
computers security » computer security
computing security » computer security, computing series
computers security » computer security
computing security » computer security, computing series
1
Published 2005
Subjects:
“...Computer networks Security measures Congresses....”
Book
2
by Kizza, Joseph Migga,
Published 2015
Table of Contents:
“...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...”Published 2015
Book
3
Published 2003
Table of Contents:
“...ForNet: A Distributed Forensics Network /...”
Book
4
Published 2015
Table of Contents:
“....-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio...”
Book
5
by Kizza, Joseph Migga,
Published 2005
Table of Contents:
“...Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network...”Published 2005
Book
6
by Kizza, Joseph Migga,
Published 2017
Table of Contents:
“...Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer...”Published 2017
Book
7
Published 2003
Subjects:
“...Computer networks Security measures Congresses....”Access to the SpringerLink online version restricted; authentication may be required:
Electronic
8
Published 2003
Subjects:
“...Computer networks Security measures Congresses....”Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Access to the SpringerLink online version restricted (authentication may be required):
Serial
9
10
Published 1999
Table of Contents:
“...Secure transport of authentication data in third generation mobile phone networks / Stefan Pütz...”
Book
11
by Baumgart, Rainer,
Published 1999
Table of Contents:
“... -- Network Security (Workshop Notes) -- On Privacy Issues of Internet Access Services via Proxy Servers...”Published 1999
Book
12
Published 2009
Table of Contents:
“...Overview of system and network security : a comprehensive introduction /...”
Book
13
by Summers, Rita C.
Published 1997
Table of Contents:
“...The Context for Computer Security --...”Published 1997
Book
14
Published 2008
Subjects:
“...Computer networks Security measures....”
Book
15
Published 2014
Table of Contents:
“...Security and privacy in networked systems -- Authentication and access control systems...”
Book
16
by Lehtinen, Rick.
Published 2006
Table of Contents:
“...Introduction -- Some security history -- Computer system security and access controls -- Viruses...”Published 2006
Book
17
by Pfleeger, Charles P., 1948-
Published 1997
Table of Contents:
“...1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure...”Published 1997
Book
18
“...Nowadays, miscellaneous towards computer network can always be read through newspaper and be seen...”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
19
by Gumel, Lawan Ahmed
Published 1999
“... of threats and vulnerabilities to computer networks are
outlined as well as network security objectives...”Published 1999
Get full text
Get full text
Thesis
20
Access to the ScienceDirect online version restricted (authentication may be required):
Journal


