Items 16 - 30 of 65
1 2 3 4 5
Sort: 

Cyberwarfare: An Introduction to Information-Age Conflict
Cyberwarfare: An Introduction to Information-Age Conflict
By (author): Isaac R. Porche III
Published: 12/31/2019
Pages: 380
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
By (author): Jose Nazario
Published: 10/31/2003
Pages: 318
Developing Secure Distributed Systems with CORBA
Developing Secure Distributed Systems with CORBA
By (author)s: Ulrich Lang, Rudolf Schreiner
Published: 01/31/2002
Pages: 332
EDI Security, Control, and Audit
EDI Security, Control, and Audit
Published: 04/30/1993
Pages: 234
End-to-End Encrypted Messaging
End-to-End Encrypted Messaging
By (author): Rolf Oppliger
Published: 04/30/2020
Pages: 360
Engineering Safe and Secure Software Systems
Engineering Safe and Secure Software Systems
By (author): C. Warren Axelrod
Published: 11/30/2012
Pages: 350
Fundamentals of Network Security
Fundamentals of Network Security
By (author): John E. Canavan
Published: 01/31/2001
Pages: 350
Identity Management-Concepts, Technologies, and Systems
Identity Management-Concepts, Technologies, and Systems
Published: 12/30/2010
Pages: 194
Implementing Security for ATM Networks
Implementing Security for ATM Networks
Published: 11/30/2001
Pages: 318
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
By (author): Edward Humphreys
Published: 02/29/2016
Pages: 224
1 2 3 4 5