Narrow your search
Listing 1 - 10 of 20 << page
of 2
>>
Sort by
Intranet security
Author:
ISBN: 156607990X Year: 1997 Publisher: Charleston, S.C. Computer Technology Research Corporation

Planning for PKI : Best practices guide for demoying public key infrastructure
Authors: ---
ISBN: 0471397024 Year: 2001 Publisher: U.S.A. : John Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Web security: a step-by-step reference guide
Author:
ISBN: 0201634899 Year: 1998 Publisher: Reading (Mass.) Addison-Wesley

Managing security with Snort and IDS tools.
Authors: ---
ISBN: 0596006616 Year: 2004 Publisher: Beijing O'Reilly

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

681.3*K65 --- Computer security. --- Computers --- Computer networks --- Computer security --- -Computer networks --- -005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Access control. --- Security measures. --- Access control --- Security measures --- Distributed processing --- Snort (Computer file) --- Intrusion detection systems (Computer security) --- Intrusion detection systems (Computer security). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 005.8 --- IDSs (Intrusion detection systems) --- Snort (Software)

The code book : the secret history of codes and codebreaking
Author:
ISBN: 9781857028898 1857028899 Year: 2000 Publisher: London Fourth Estate

Listing 1 - 10 of 20 << page
of 2
>>
Sort by