Internet and wireless security edited by Robert Temple and John Regnault.
Saved in:
Corporate Author: | The Institution of Engineering and Technology |
---|---|
Other Authors: | Temple, Robert, 1963-, Regnault, John |
Format: | eBook |
Language: | English |
Published: |
Stevenage :
IET,
2002.
|
Series: | BT Technology Communications Series 4.
|
Subjects: | |
Online Access: | http://dx.doi.org/10.1049/PBBT004E |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Loading…
Iris biometric model for secured network access Franjieh El Khoury.
by: Khoury, Franjieh El
Published: (2013)
by: Khoury, Franjieh El
Published: (2013)
Loading…
Cryptography and network security / Behrouz A. Forouzan.
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Loading…
Physical-layer security and quantum key distribution Ivan B. Djordjevic.
by: Djordjevic, Ivan
Published: (2019)
by: Djordjevic, Ivan
Published: (2019)
Loading…
Intrusion detection networks : a key to collaborative security / Carol Fung and Raouf Boutaba.
by: Fung, Carol, et al.
Published: (2014)
by: Fung, Carol, et al.
Published: (2014)
Loading…
Mechanics of user identification and authentication : fundamentals of identity management / Dobromir Todorov.
by: Todorov, Dobromir
Published: (2007)
by: Todorov, Dobromir
Published: (2007)
Loading…
Security management in mobile cloud computing / Kashif Munir, editor.
Published: (2017)
Published: (2017)
Loading…
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
Loading…
Building Internet firewalls / Elizabeth D. Zwicky, Simon Cooper and D. Brent Chapman.
by: Zwicky, Elizabeth D.
Published: (2000)
by: Zwicky, Elizabeth D.
Published: (2000)
Loading…
Beginning cryptography with Java / David Hook.
by: Hook, David, 1962-
Published: (2005)
by: Hook, David, 1962-
Published: (2005)
Loading…
Beginning cryptography with Java David Hook.
by: Hook, David, 1962-
Published: (2005)
by: Hook, David, 1962-
Published: (2005)
Loading…
Advances in secure computing, internet services, and applications / B.K. Tripathy and D.P. Acharjya, editors.
Published: (2014)
Published: (2014)
Loading…
Computer viruses and other malicious software : a threat to the internet economy.
Published: (2009)
Published: (2009)
Loading…
Internet cryptography / Richard E. Smith.
by: Smith, Richard E., 1952-
Published: (1997)
by: Smith, Richard E., 1952-
Published: (1997)
Loading…
Security and communication networks
Loading…
The LaTeX Web companion : integrating TeX, HTML, and XML / Michel Goossens, Sebastian Rahtz ; with Eitan M. Gurari, Ross Moore, and Robert S. Sutor.
by: Goossens, Michel
Published: (1999)
by: Goossens, Michel
Published: (1999)
Loading…
Actually useful Internet security techniques / Larry J. Hughes.
by: Hughes, Larry J., 1961-
Published: (1995)
by: Hughes, Larry J., 1961-
Published: (1995)
Loading…
Inside Internet security : what hackers don't want you to know / Jeff Crume.
by: Crume, Jeff
Published: (2000)
by: Crume, Jeff
Published: (2000)
Loading…
Cyberphobia : identity, trust, security and the Internet / Edward Lucas.
by: Lucas, Edward, 1962-
Published: (2015)
by: Lucas, Edward, 1962-
Published: (2015)
Loading…
Group theoretic cryptography / Maria Isabel Gonzalez Vasco, Rainer Steinwandt.
by: Gonzalez Vasco, Maria Isabel, et al.
Published: (2015)
by: Gonzalez Vasco, Maria Isabel, et al.
Published: (2015)
Loading…
Group theoretic cryptography Maria Isabel González Vasco, Rainer Steinwandt.
by: Vasco, Maria Isabel González, et al.
Published: (2015)
by: Vasco, Maria Isabel González, et al.
Published: (2015)
Loading…
Advances in UML and XML-based software evolution Hongji Yang, [editor].
Published: (2005)
Published: (2005)
Loading…
Role engineering for enterprise security management / Edward J. Coyne, John M. Davis.
by: Coyne, Edward J., 1930-
Published: (2008)
by: Coyne, Edward J., 1930-
Published: (2008)
Loading…
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data / Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.
Published: (2010)
Published: (2010)
Loading…
Network security : data and voice communications / Fred Simonds.
by: Simonds, Fred
Published: (1996)
by: Simonds, Fred
Published: (1996)
Loading…
Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch.
by: White, Gregory W.
Published: (1996)
by: White, Gregory W.
Published: (1996)
Loading…
Assessing information security strategies, tactics, logic and framework / Andrew Vladimirov, Andriej Michajlowski and Konstantin Gavrilenko.
by: Vladimirov, Andrew
Published: (2014)
by: Vladimirov, Andrew
Published: (2014)
Loading…
Assessing information security : strategies, tactics, logic and framework / A. Vladimirov, K. Gavrilenko, A. Michajlowski.
by: Vladimirov, Andrew A., et al.
Published: (2014)
by: Vladimirov, Andrew A., et al.
Published: (2014)
Loading…
Secrets and lies : digital security in a networked world / Bruce Schneier.
by: Schneier, Bruce, 1963-
Published: (2015)
by: Schneier, Bruce, 1963-
Published: (2015)
Loading…
Principles of information systems security : text and cases / Gurpreet Dhillon.
by: Dhillon, Gurpreet, 1963-
Published: (2007)
by: Dhillon, Gurpreet, 1963-
Published: (2007)
Loading…
Intrusion detection : network security beyond the firewall / Terry Escamilla.
by: Escamilla, Terry, 1956-
Published: (1998)
by: Escamilla, Terry, 1956-
Published: (1998)
Loading…
Trusted computing / Chris Mitchell.
Published: (2005)
Published: (2005)
Loading…
Global e-security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008 : proceedings / Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown (eds.).
Published: (2008)
Published: (2008)
Loading…
Digital privacy theory, technologies, and practices / edited by Alessandro Acquisti ... [et al.].
Published: (2008)
Published: (2008)
Loading…
Secrets and lies : digital security in a networked world / Bruce Schneier.
by: Schneier, Bruce, 1963-
Published: (2000)
by: Schneier, Bruce, 1963-
Published: (2000)
Loading…
24 deadly sins of software security : programming flaws and how to fix them / Michael Howard, David Leblanc, and John Viega.
by: Howard, Michael, 1965-
Published: (2009)
by: Howard, Michael, 1965-
Published: (2009)
Loading…
Network security essentials applications and standards / William Stallings.
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Loading…
Principles of information security / Michael E. Whitman, Ph.D., CISM, CISSP, Herbert J. Mattord, Ph.D., CISM, CISSP.
by: Whitman, Michael E., 1964-, et al.
Published: (2018)
by: Whitman, Michael E., 1964-, et al.
Published: (2018)
Loading…
Current security management & ethical issues of information technology edited by Rasool Azari.
Published: (2003)
Published: (2003)
Loading…
Digital resilience : is your company ready for the next cyber threat? / Ray A. Rothrock ; foreword by Richard A. Clarke.
by: Rothrock, Ray A.
Published: (2018)
by: Rothrock, Ray A.
Published: (2018)
Loading…
Network security essentials : applications and standards / William Stallings.
by: Stallings, William
Published: (2003)
by: Stallings, William
Published: (2003)
Similar Items
-
Iris biometric model for secured network access Franjieh El Khoury.
by: Khoury, Franjieh El
Published: (2013) -
Cryptography and network security / Behrouz A. Forouzan.
by: Forouzan, Behrouz A.
Published: (2008) -
Physical-layer security and quantum key distribution Ivan B. Djordjevic.
by: Djordjevic, Ivan
Published: (2019) -
Intrusion detection networks : a key to collaborative security / Carol Fung and Raouf Boutaba.
by: Fung, Carol, et al.
Published: (2014) -
Mechanics of user identification and authentication : fundamentals of identity management / Dobromir Todorov.
by: Todorov, Dobromir
Published: (2007)