by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2018
Excerpt:
4
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
4
by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2016
Excerpt:
4
by
Mukhopadhyay, Debdeep.
Format:
Books
Publication Date
2015
Excerpt:
1. Background -- 2. Hardware design of cryptographic algorithms -- 3. Side channel analysis -- 4
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
encrypt() function. One strength of SiC4 has been its sidebars. Readers enjoy the brief examples of real
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
-- 2.4.3.Internet Protocol Addresses -- 2.4.4.Public versus Private IP Addresses -- 2.4.5.Finding an IP
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
.F. Mjølsnes -- 1.4.1.The Book Structure / S.F. Mjølsnes -- 1.4.2.Security Electronics / S.F. Mjølsnes -- 1.4.3
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
4
by
Stallings, William.
Format:
Books
Publication Date
2011
Excerpt:
4
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
. 3. Planning for contingencies -- ch. 4. Information security policy -- ch. 5. Developing the
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
-Oxley -- 3. ISO27001 -- 4. Organizing information security -- 5. Information security policy and scope -- 6
by
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:
Books
Publication Date
2007
Excerpt:
. Program security -- Ch. 4. Protection in general-purpose operating systems -- Ch. 5. Designing trusted
by
Stallings, William.
Table of contents only http://www.loc.gov/catdir/toc/fy0706/2006287096.html
Format:
Books
Publication Date
2007
Excerpt:
4
by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
by
Ben-Natan, Ron.
Format:
Books
Publication Date
2005
Excerpt:
-in-depth strategy -- 3. The database as a networked server -- 4. Authentication and password security -- 5
by
Poole, Owen.
Format:
Books
Publication Date
2003
Excerpt:
4
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
2003
Excerpt:
. Program Security -- Ch. 4. Protection in General-Purpose Operating Systems -- Ch. 5. Designing Trusted
by
Brenton, Chris.
Format:
Electronic Resources
Publication Date
2001
Excerpt:
http://www.contentreserve.com/TitleInfo.asp?ID={C0E06398-F64D-4C14-BAA2-D2ADC889DA37}&Format=50
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
for EDP Security -- Ch. 4. Protection of Information -- Ch. 5. Screening and Management of Personnel
by
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:
Books
Publication Date
1996
Excerpt:
responsibilities -- 3. Users and passwords -- 4. Users, groups, and the superuser -- 5. The UNIX filesystem -- 6
Limit Search Results
Narrowed by: