by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
organisational and customer data but will also be valuable to anyone concerned with data protection."--Publisher
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will
by
Andress, Jason.
Format:
Books
Publication Date
2014
Excerpt:
security world. We will then dive into practical applications of these ideas in the areas of operations
by
Jacobson, Douglas.
Format:
Books
Publication Date
2013
Excerpt:
reader will be able to: - Define computer security terms and mechanisms - Describe fundamental security
by
Mjølsnes, Stig F.
Format:
Books
Publication Date
2012
Excerpt:
may be familiar turf for the reader already. However, the reader will likely also nd some new
by
Howard, Doug.
Format:
Books
Publication Date
2011
Excerpt:
-- Where security threats will come from in the future -- Secure communications and collaboration -- 2020
Limit Search Results
Narrowed by: