by
Slay, Jill.
Format:
Books
Publication Date
2006
Excerpt:
Information technology security & risk management / Slay, Jill.
by
Stallings, William, author.
Format:
Books
Publication Date
2018
Excerpt:
-- Part Three: Management Issues -- Part Four: Cryptographic Algorithms -- Part Five: Network Security.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2012
Excerpt:
Information technology -- Security measures.
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
TECHNOLOGY & ENGINEERING / Electrical.
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2009
Excerpt:
technology : firewalls and VPNs -- 7. Security technology : intrusion detection, access control, and other
by
Yee, George.
Table of contents http://www.loc.gov/catdir/toc/ecip063/2005032104.html
Format:
Books
Publication Date
2006
Excerpt:
Management Architectures for E-Services -- Modeling Method for Assessing Privacy Technologies -- Legislative
by
Egan, Mark.
Format:
Books
Publication Date
2005
Excerpt:
Information technology -- Management.
by
Pfleeger, Charles P., 1948-
Format:
Books
Publication Date
1997
Excerpt:
-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Limit Search Results
Narrowed by: