Limit Search Results
Author
Language
Subject
315 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
6. 
Cover image for Information security : principles and new concepts
7. 
Cover image for Managing risk in information systems
15. 
Cover image for Access control, authentication, and public key infrastructure
16. 
Cover image for The Intrusion detection networks : a key to collaborative security
19. 
Cover image for UTM security with Fortinet : Mastering FortiOS
26. 
Cover image for Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux
28. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
37. 
Cover image for Client-side attacks and defense
39. 
Cover image for Role mining in business : taming role-based access control administration
49. 
Cover image for A multidisciplinary introduction to information security
53. 
Cover image for Metasploit :  the penetration tester’s guide
54. 
Cover image for Managed code rootkits : hooking into runtime environments
55. 
Cover image for Access control, security, and trust : a logical approach
63. 
Cover image for Seven deadliest network attacks
67. 
Cover image for Contention-based collision-resolution medium access control algorithms
68. 
Cover image for Expert SQL server 2008 encryption
70. 
Cover image for Handbook of research on information security and assurance
73. 
Cover image for Implementing NAP and NAC security technologies : the complete guide to network access control
74. 
Cover image for Policy-driven mobile ad hoc network management
75. 
Cover image for Access denied : the practice and policy of global Internet filtering
76. 
Cover image for Implementing NAP and NAC security technologies : the complete  guide to network access control
77. 
Cover image for Role engineering for enterprise security management
80. 
Cover image for Oracle identity management : governance, risk, and compliance architecture
81. 
Cover image for Role-based access control
82. 
Cover image for Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
83. 
Cover image for Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings
85. 
Cover image for Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI
86. 
Cover image for IT security governance guidebook with security program metrics on CD-ROM
88. 
Cover image for Integrated security systems design : concepts, specifications, and implementation
90. 
Cover image for Cryptology unlocked
91. 
Cover image for Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedings
92. 
Cover image for Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedings
93. 
Cover image for Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings
94. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
95. 
Cover image for Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
96. 
Cover image for Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
97. 
Cover image for Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
102. 
Cover image for Cisco Network Admission Control
103. 
Cover image for Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings
105. 
Cover image for Mechanics of user identification and authentication : fundamentals of identity management
106. 
Cover image for Cryptography and security services : mechanisms and applications
111. 
Cover image for Privacy-respecting intrusion detection
112. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
113. 
Cover image for Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings
114. 
Cover image for Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings
117. 
Cover image for Multivariate public key cryptosystems
118. 
Cover image for Networked embedded sensing and control : Workshop NESC'05 : University of Notre Dame, USA, October 2005 proceedings
120. 
Cover image for Access control systems : security, identity management and trust models
131. 
Cover image for Linux firewalls
132. 
Cover image for Advances in biometrics : international conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedings
133. 
Cover image for Advanced host intrusion prevention with CSA
134. 
Cover image for Intrusion prevention fundamentals
140. 
Cover image for Information systems security :  first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
143. 
Cover image for Building Cisco remote access networks (BCRAN) : CCNP self-study
147. 
Cover image for Snort for dummies
148. 
Cover image for The hackers handbook : the strategy behind breaking into and defending networks
149. 
Cover image for Outsourcing information security
153. 
Cover image for Cisco access control security : AAA administrative services
162. 
Cover image for Research directions in data and applications security : IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK
163. 
Cover image for Role-based access control
164. 
Cover image for Biometrics
168. 
Cover image for Linux firewalls
172. 
Cover image for Network security : private communication in a public world
173. 
Cover image for Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings
180. 
Cover image for Internet and intranet security
183. 
Cover image for Intrusion signatures and analysis
199. 
Cover image for Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedings
225. 
226. 
232. 
Cover image for Database security, III : status and prospects
236. 
Cover image for Cryptology and computational number theory
239. 
Cover image for Security mechanisms for computer networks
242. 
Cover image for Security and protection in information system
247. 
Cover image for Auditing computer security : a manual with case studies
257. 
Cover image for Computer security
263. 
Cover image for Proceedings of the Symposium on Security and Privacy, 1985, Oakland, California
265. 
Cover image for Computer-security technology
268. 
Cover image for How to prevent computer crime : a guide for        managers
270. 
Cover image for Geodetic computation crime : a guide for managers
272. 
Cover image for Database security and integrity
273. 
Cover image for Computer fraud and counter measures
274. 
Cover image for Computer security
276. 
Cover image for Modern methods for computer security and privacy
277. 
Cover image for System 360/370 : job control language and the access methods