Tomeki

Explore Books on
computer information security

1-19 of 19 Books

View Advances in Computers By Marshall C. Yovits
Cover of Advances in Computers by marshall c. yovits

Advances in Computers

By Marshall C. Yovits

View Essential System Administration By Æleen Frisch
Cover of Essential System Administration by æleen frisch

Essential System Administration

By Æleen Frisch

View The Internet worm By Peter J. Denning

The Internet worm

The Internet worm

By Peter J. Denning

View Computer security By David K. Hsiao
Cover of Computer security by david k. hsiao

Computer security

By David K. Hsiao

View Disaster Management in Telecommunications, Broadcasting and Computer Systems By Galal El Mahdy
Cover of Disaster Management in Telecommunications, Broadcasting and Computer Systems by galal el mahdy

Disaster Management in Telecommunications, Broadcasting and Computer Systems

By Galal El Mahdy

View Principles of Information Systems Security By Gurpreet Dhillon
Cover of Principles of Information Systems Security by gurpreet dhillon

Principles of Information Systems Security

By Gurpreet Dhillon

View New Security Paradigms Workshop By ACM SIGSAC New Security Paradigms Workshop (2002 Virginia Beach, Va.)

New Security Paradigms Workshop

New Security Paradigms Workshop

By ACM SIGSAC New Security Paradigms Workshop (2002 Virginia Beach, Va.)

View KNOW IT security By James P. Litchko
Cover of KNOW IT security by james p. litchko

KNOW IT security

By James P. Litchko

View 6th ACM Conference on Computer and Communications Security By ACM Conference on Computer and Communications Security (6th 1999 Singapore)
Cover of 6th ACM Conference on Computer and Communications Security by acm conference on computer and communications security (6th 1999 singapore)

6th ACM Conference on Computer and Communications Security

By ACM Conference on Computer and Communications Security (6th 1999 Singapore)

View Space lab system analysis By Frank M. Ingels

Space lab system analysis

Space lab system analysis

By Frank M. Ingels

View Partitioning in avionics architectures By John Rushby

Partitioning in avionics architectures

Partitioning in avionics architectures

By John Rushby

View Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO By Robert I. Griffin

Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO

Firewall traversal for CORBRA applications using an implementation of bidirectional IIOP in MICO

By Robert I. Griffin

View The Process of Network Security By Thomas A. Wadlow
Cover of The Process of Network Security by thomas a. wadlow

The Process of Network Security

By Thomas A. Wadlow

View Vernetzte (Un-)Sicherheit? By Jakob Kullik
Cover of Vernetzte (Un-)Sicherheit? by jakob kullik

Vernetzte (Un-)Sicherheit?

By Jakob Kullik

View Intrusion detection By Terry Escamilla
Cover of Intrusion detection by terry escamilla

Intrusion detection

By Terry Escamilla

View NCSC Annual Review By

NCSC Annual Review

NCSC Annual Review

By

View A formal model of partitioning for integrated modular avionics By Ben L. Di Vito

A formal model of partitioning for integrated modular avionics

A formal model of partitioning for integrated modular avionics

By Ben L. Di Vito

View Theft of information in the take-grant protection model By Matt Bishop

Theft of information in the take-grant protection model

Theft of information in the take-grant protection model

By Matt Bishop

View COSPO/CENDI Industry Day Conference By COSPO/CENDI Industry Day Conference (1995 Alexandria, Va.)

COSPO/CENDI Industry Day Conference

COSPO/CENDI Industry Day Conference

By COSPO/CENDI Industry Day Conference (1995 Alexandria, Va.)