Tomeki

Explore Books on
accès

1-24 of 132 Books

View Information Security By Mark Stamp
Cover of Information Security by mark stamp

Information Security

By Mark Stamp

View Security protocols By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe
Cover of Security protocols by bruce christianson,bruno crispo,james a. malcolm,michael roe

Security protocols

By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe

View Data Privacy for the Smart Grid By Rebecca Herold,Christine Hertzog

Data Privacy for the Smart Grid

Data Privacy for the Smart Grid

By Rebecca Herold,Christine Hertzog

View Seaports and development By Hoyle, B. S.

Seaports and development

Seaports and development

By Hoyle, B. S.

View Web Security & Commerce By Simson Garfinkel,Gene Spafford
Cover of Web Security & Commerce by simson garfinkel,gene spafford

Web Security & Commerce

By Simson Garfinkel,Gene Spafford

View Disclosure in Health and Illness By Davis, Mark,Lenore Manderson
Cover of Disclosure in Health and Illness by davis, mark,lenore manderson

Disclosure in Health and Illness

By Davis, Mark,Lenore Manderson

View The practical guide to HIPAA privacy and security compliance By Kevin Beaver
Cover of The practical guide to HIPAA privacy and security compliance by kevin beaver

The practical guide to HIPAA privacy and security compliance

By Kevin Beaver

View Collaborative access to virtual museum collection information By Bernadette G. Callery
Cover of Collaborative access to virtual museum collection information by bernadette g. callery

Collaborative access to virtual museum collection information

By Bernadette G. Callery

View Handbook of applied cryptography By Alfred J. Menezes
Cover of Handbook of applied cryptography by alfred j. menezes

Handbook of applied cryptography

By Alfred J. Menezes

View Integrating a Usable Security Protocol into User Authentication Services Design Process By Ahmed Seffah,Christina Braz,Syed Naqvi

Integrating a Usable Security Protocol into User Authentication Services Design Process

Integrating a Usable Security Protocol into User Authentication Services Design Process

By Ahmed Seffah,Christina Braz,Syed Naqvi

View Access and Control in Digital Humanities By Shane Hawkins

Access and Control in Digital Humanities

Access and Control in Digital Humanities

By Shane Hawkins

View Access Control, Security, and Trust By Shiu-Kai Chin,Susan Beth Older
Cover of Access Control, Security, and Trust by shiu-kai chin,susan beth older

Access Control, Security, and Trust

By Shiu-Kai Chin,Susan Beth Older

View Practical UNIX Security By Simson Garfinkel,Gene Spafford
Cover of Practical UNIX Security by simson garfinkel,gene spafford

Practical UNIX Security

By Simson Garfinkel,Gene Spafford

View Mechanics of user identification and authentication By Dobromir Todorov
Cover of Mechanics of user identification and authentication by dobromir todorov

Mechanics of user identification and authentication

By Dobromir Todorov

View Introduction to broadband communication systems By Cajetan M. Akujuobi
Cover of Introduction to broadband communication systems by cajetan m. akujuobi

Introduction to broadband communication systems

By Cajetan M. Akujuobi

View Attribute-Based Encryption and Access Control By Dijiang Huang,Qiuxiang Dong,Zhu, Yan

Attribute-Based Encryption and Access Control

Attribute-Based Encryption and Access Control

By Dijiang Huang,Qiuxiang Dong,Zhu, Yan

View Medical records use and abuse By Heidi Tranberg,Jem Rashbass
Cover of Medical records use and abuse by heidi tranberg,jem rashbass

Medical records use and abuse

By Heidi Tranberg,Jem Rashbass

View Identity Management for Internet of Things By Parikshit N. Mahalle,Poonam N. Railkar
Cover of Identity Management for Internet of Things by parikshit n. mahalle,poonam n. railkar

Identity Management for Internet of Things

By Parikshit N. Mahalle,Poonam N. Railkar

View Complete guide to security and privacy metrics By Debra S. Herrmann
Cover of Complete guide to security and privacy metrics by debra s. herrmann

Complete guide to security and privacy metrics

By Debra S. Herrmann

View The Digital Person By Daniel J. Solove
Cover of The Digital Person by daniel j. solove

The Digital Person

By Daniel J. Solove

View Oracle identity management By Marlin B. Pohlman
Cover of Oracle identity management by marlin b. pohlman

Oracle identity management

By Marlin B. Pohlman

View The state of the art in intrusion prevention and detection By Al-Sakib Khan Pathan
Cover of The state of the art in intrusion prevention and detection by al-sakib khan pathan

The state of the art in intrusion prevention and detection

By Al-Sakib Khan Pathan

View Intrusion detection networks By Carol Fung
Cover of Intrusion detection networks by carol fung

Intrusion detection networks

By Carol Fung

View Archival Silences By Michael S. Moss,David Thomas

Archival Silences

Archival Silences

By Michael S. Moss,David Thomas