Search Results - "information security"

  1. 141

    Synchronizing internet protocol security (sipsec) by Shoniregun, Charles A.

    Published 2007
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  2. 142

    Security for telecommunications networks by Traynor, Patrick

    Published 2008
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  3. 143

    Adaptive cryptographic access control by Kayem, Anne V. D. M.

    Published 2010
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  4. 144

    Spyware and adware by Aycock, John

    Published 2011
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Unknown
  5. 145

    Cyber Warfare Building the Scientific Foundation

    Published 2015
    “…Advances in information security…”
    Click Here to View Status and Holdings.
    Manuscript Book
  6. 146

    Role-based access control by Ferraiolo, David

    Published 2007
    “…Artech House information security and privacy series…”
    Click Here to View Status and Holdings.
    Unknown
  7. 147

    Introduction to identity-based encryption by Martin, Luther

    Published 2008
    “…Artech House information security and privacy series…”
    Click Here to View Status and Holdings.
    Unknown
  8. 148

    Role engineering for enterprise security management by Coyne, Edward J. PhD

    Published 2008
    “…Artech House information security and privacy series…”
    Click Here to View Status and Holdings.
    Unknown
  9. 149

    Cryptography for security and privacy in cloud computing by Rass, Stefan

    Published 2014
    “…rtech House information security and privacy series…”
    Click Here to View Status and Holdings.
    Unknown
  10. 150

    Control and security of e-commerce by Smith, Gordon E (Gordon Edward)

    Published 2004
    Table of Contents: “…Introduction -- Legal issues related to e-commerce -- Information security -- Certificates and non-repudiation -- Protecting the e-commerce environment -- Protecting e-commerce data -- Auditing an e-commerce application…”
    Click Here to View Status and Holdings.
    Unknown
  11. 151

    THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments by Landoll, Douglas J.

    Published 2020
    Table of Contents: “…Introduction. Information Security Risk Assessment Basics. Project Definition. …”
    Click Here to View Status and Holdings.
    Book
  12. 152
  13. 153
  14. 154

    Building a GIS system architecture design strategies for managers by Peters, Dave 1948-

    Published 2012
    Table of Contents: “…I: Understanding the GIS software technology -- System design process -- GIS software technology -- Software performance -- GIS data administration -- II: Understanding the IT infrastructure -- Network communications -- GIS product architecture -- Platform performance -- Information security -- III: Putting it all together -- Performance fundamentals -- Capacity planning tool -- City of Rome case study -- System implementation.…”
    Click Here to View Status and Holdings.
    Unknown
  15. 155

    Business driven information systems by Baltzan, Paige

    Published 2009
    Table of Contents: “…Information systems in business -- Strategic decision making -- Ebusiness -- Ethics and information security -- Enterprise architectures -- Databases and data warehouses -- Networks, telecommunications, and mobile technology -- Operations management and supply chain management -- Customer relationship management and business intelligence -- Enterprise resource planning and collaboration systems -- Systems development and project management -- Globalization, Innovation, and 21st century organizational trends…”
    Click Here to View Status and Holdings.
    Unknown
  16. 156
  17. 157
  18. 158
  19. 159
  20. 160