by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
the primary source of vulnerability -- software, operating system, protocol, user error -- and not
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
.Introduction -- 2.2.Computers -- 2.2.1.Hardware -- 2.2.2.Operating Systems -- 2.2.3.Applications -- 2.2.4.Users
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
.F. Mjølsnes -- 1.4.10.Software Security / S.F. Mjølsnes -- 1.4.11.ICT Security Evaluation / S.F. Mjølsnes -- 1
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
. Operating system access control -- 21. Application access control and teleworking -- 22. Systems acquisition
Limit Search Results
Narrowed by: