Tomeki

Explore Books on
computers access control

1-24 of 356 Books

View Advanced Computing and Systems for Security By Rituparna Chaki,Agostino Cortesi,Khalid Saeed,Nabendu Chaki
Cover of Advanced Computing and Systems for Security by rituparna chaki,agostino cortesi,khalid saeed,nabendu chaki

Advanced Computing and Systems for Security

By Rituparna Chaki,Agostino Cortesi,Khalid Saeed,Nabendu Chaki

View Security in Computing and Communications By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero
Cover of Security in Computing and Communications by sabu m. thampi,sanjay madria,guojun wang,danda b. rawat,jose m. alcaraz calero

Security in Computing and Communications

By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero

View Network Security Assessment By Chris McNab
Cover of Network Security Assessment by chris mcnab

Network Security Assessment

By Chris McNab

View The net delusion By Evgeny Morozov,E. Morozov,Eduardo G. Murillo
Cover of The net delusion by evgeny morozov,e. morozov,eduardo g. murillo

The net delusion

By Evgeny Morozov,E. Morozov,Eduardo G. Murillo

View Security protocols By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe
Cover of Security protocols by bruce christianson,bruno crispo,james a. malcolm,michael roe

Security protocols

By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe

View Privacy Technologies and Policy By Manel Medina,Andreas Mitrakas,Kai Rannenberg,Erich Schweighofer,Nikolaos Tsouroulas
Cover of Privacy Technologies and Policy by manel medina,andreas mitrakas,kai rannenberg,erich schweighofer,nikolaos tsouroulas

Privacy Technologies and Policy

By Manel Medina,Andreas Mitrakas,Kai Rannenberg,Erich Schweighofer,Nikolaos Tsouroulas

View Mobile access safety By Dominique Assing

Mobile access safety

Mobile access safety

By Dominique Assing

View Information Systems Security and Privacy By Olivier Camp,Edgar Weippl,Christophe Bidan,Esma Aïmeur
Cover of Information Systems Security and Privacy by olivier camp,edgar weippl,christophe bidan,esma aïmeur

Information Systems Security and Privacy

By Olivier Camp,Edgar Weippl,Christophe Bidan,Esma Aïmeur

View 802.1X port-based authentication By Edwin Lyle Brown
Cover of 802.1X port-based authentication by edwin lyle brown

802.1X port-based authentication

By Edwin Lyle Brown

View Integrating a Usable Security Protocol into User Authentication Services Design Process By Ahmed Seffah,Christina Braz,Syed Naqvi

Integrating a Usable Security Protocol into User Authentication Services Design Process

Integrating a Usable Security Protocol into User Authentication Services Design Process

By Ahmed Seffah,Christina Braz,Syed Naqvi

View Cisco ISE for BYOD and Secure Unified Access By Jamey Heary
Cover of Cisco ISE for BYOD and Secure Unified Access by jamey heary

Cisco ISE for BYOD and Secure Unified Access

By Jamey Heary

View Access Control, Security, and Trust By Shiu-Kai Chin,Susan Beth Older
Cover of Access Control, Security, and Trust by shiu-kai chin,susan beth older

Access Control, Security, and Trust

By Shiu-Kai Chin,Susan Beth Older

View Broadband Access By Steven Scott Gorshe,Dilip Krishnaswamy,Starr, Thomas,Stefano Galli,Arvind Raghavan
Cover of Broadband Access by steven scott gorshe,dilip krishnaswamy,starr, thomas,stefano galli,arvind raghavan

Broadband Access

By Steven Scott Gorshe,Dilip Krishnaswamy,Starr, Thomas,Stefano Galli,Arvind Raghavan

View Access denied By Ronald Deibert
Cover of Access denied by ronald deibert

Access denied

By Ronald Deibert

View Penetration tester's open source toolkit By Jeremy Faircloth
Cover of Penetration tester's open source toolkit by jeremy faircloth

Penetration tester's open source toolkit

By Jeremy Faircloth

View Research in Attacks, Intrusions and Defenses By Angelos Stavrou,Herbert Bos,Georgios Portokalidis
Cover of Research in Attacks, Intrusions and Defenses by angelos stavrou,herbert bos,georgios portokalidis

Research in Attacks, Intrusions and Defenses

By Angelos Stavrou,Herbert Bos,Georgios Portokalidis

View Information security architecture By Jan Killmeyer Tudor
Cover of Information security architecture by jan killmeyer tudor

Information security architecture

By Jan Killmeyer Tudor

View Identity Management for Internet of Things By Parikshit N. Mahalle,Poonam N. Railkar
Cover of Identity Management for Internet of Things by parikshit n. mahalle,poonam n. railkar

Identity Management for Internet of Things

By Parikshit N. Mahalle,Poonam N. Railkar

View Engineering Secure Software and Systems By Jan Jürjens
Cover of Engineering Secure Software and Systems by jan jürjens

Engineering Secure Software and Systems

By Jan Jürjens

View Multivariate public key cryptosystems By Jintai Ding,Jason E. Gower,Dieter Schmidt
Cover of Multivariate public key cryptosystems by jintai ding,jason e. gower,dieter schmidt

Multivariate public key cryptosystems

By Jintai Ding,Jason E. Gower,Dieter Schmidt

View Understanding and applying cryptography and data security By Adam J. Elbirt
Cover of Understanding and applying cryptography and data security by adam j. elbirt

Understanding and applying cryptography and data security

By Adam J. Elbirt

View Modern Cryptography By Wenbo Mao
Cover of Modern Cryptography by wenbo mao

Modern Cryptography

By Wenbo Mao

View Mechanics of user identification and authentication By Dobromir Todorov
Cover of Mechanics of user identification and authentication by dobromir todorov

Mechanics of user identification and authentication

By Dobromir Todorov

View Implementing 802.1X Security Solutions for Wired and Wireless Networks By Jim Geier
Cover of Implementing 802.1X Security Solutions for Wired and Wireless Networks by jim geier

Implementing 802.1X Security Solutions for Wired and Wireless Networks

By Jim Geier