by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2018
Excerpt:
6
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
6
by
Whitman, Michael E., 1964- author.
Format:
Books
Publication Date
2016
Excerpt:
6
by
Mukhopadhyay, Debdeep.
Format:
Books
Publication Date
2015
Excerpt:
. Hardware intellectual property protection -- 5. Hardware trojans -- 6. Physically unclonable functions.
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
Sniffing -- 3.3.5.Attacker Guesses Password -- 3.3.6.Exposed Password File -- 3.3.7.Security Questions -- 3
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
Contents note continued: 5.6.Technology / D.R. Hjelme / V. Makarov / L. Lydersen -- 5.6.1.Single
by
Stallings, William.
Format:
Books
Publication Date
2011
Excerpt:
6
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
professional issues in information security -- 4. Risk management -- 5. Planning for security -- 6. Security
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
security program -- ch. 6. Security management models and practices -- ch. 7. Risk management -- ch. 8
by
Calder, Alan, 1957-
Format:
Books
Publication Date
2008
Excerpt:
-Oxley -- 3. ISO27001 -- 4. Organizing information security -- 5. Information security policy and scope -- 6
by
Johansson, Jesper M.
Format:
Books
Publication Date
2008
Excerpt:
6
by
Pfleeger, Charles P., 1948-
Table of contents only http://www.loc.gov/catdir/toc/ecip0619/2006026798.html
Format:
Books
Publication Date
2007
Excerpt:
operating systems -- Ch. 6. Database and data mining security -- Ch. 7. Security in networks -- Ch. 8
Limit Search Results
Narrowed by: