Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
1
por Liska, Allan.
Publicado 2016
Tabla de Contenidos:
“...Chapter 1. Understanding NTP -- Chapter 2. Issues in NTP Security -- Chapter 3. Vulnerabilities...”Publicado 2016
eBook
2
Publicado 2017
Tabla de Contenidos:
“...Privacy/cryptography -- Systems security -- Security analysis -- Identity management and access...”Enlace del recurso
eBook
3
4
5
Publicado 2017
Tabla de Contenidos:
“...Data and software security -- Privacy and confidentiality -- Mobile systems security -- Biometric...”Enlace del recurso
eBook
6
7
Materias:
“...Systems and Data Security....”
eBook
8
por Pompon, Raymond.
Publicado 2016
Tabla de Contenidos:
“... Control. Chapter 17: Network Security Controls. Chapter 18: More Technical Controls. Chapter 19: Physical...”Publicado 2016
eBook
9
Publicado 2017
Tabla de Contenidos:
“...Protection of Personal Data -- CLiKC: A privacy-mindful approach when sharing data -- Ransomware...”
eBook
10
Publicado 2017
Tabla de Contenidos:
“... Applications -- Expanded Framework for Dual System Encryption and its Application -- Adaptively Secure...”
eBook
11
12
por Svensson, Robert.
Publicado 2016
Tabla de Contenidos:
“...Chapter 1: Introduction -- Chapter 2: Security Testing Basics -- Chapter 3: The Security Testing...”Publicado 2016
eBook
13
Publicado 2017
Tabla de Contenidos:
“... Flow in the Presence of Libraries -- Secure Multi-Party Computation: Information Flow of Outputs...”
eBook
14
Publicado 2017
Tabla de Contenidos:
“... Platforms and Operating Systems -- Smart Cards and Security for Mobile Communications -- Smart Cards...”
eBook
15
por Wittkop, Jeremy.
Publicado 2016
Tabla de Contenidos:
“...: Monetizing Risk -- Chapter 4: Security Intelligence Model -- Chapter 5: Incident Response Planning -- Chapter...”Publicado 2016
eBook
16
Tabla de Contenidos:
“...Security Design Principles -- Security Goals -- Secure Systems Design -- Secure Design Principles...”
eBook
17
Publicado 2017
Tabla de Contenidos:
“...Challenges of Cloud Forensics -- Iris Biometrics Recognition in Security Management -- An Approach...”
eBook
18
por Campbell, Tony.
Publicado 2016
Tabla de Contenidos:
“... Computing Security -- Chapter 13: Industrial Control Systems -- Chapter 14: Secure Systems Development....”Publicado 2016
eBook
19
20
Publicado 2017
Tabla de Contenidos:
“... and technology of cryptographic techniques -- Information content security -- System security for mobile network...”
eBook