Tomeki

Explore Books on
zugriffskontrolle

1-24 of 40 Books

View Information Security By Mark Stamp
Cover of Information Security by mark stamp

Information Security

By Mark Stamp

View The net delusion By Evgeny Morozov,E. Morozov,Eduardo G. Murillo
Cover of The net delusion by evgeny morozov,e. morozov,eduardo g. murillo

The net delusion

By Evgeny Morozov,E. Morozov,Eduardo G. Murillo

View Mechanics of user identification and authentication By Dobromir Todorov
Cover of Mechanics of user identification and authentication by dobromir todorov

Mechanics of user identification and authentication

By Dobromir Todorov

View Security for Web Services and Service-Oriented Architectures By Elisa Bertino
Cover of Security for Web Services and Service-Oriented Architectures by elisa bertino

Security for Web Services and Service-Oriented Architectures

By Elisa Bertino

View Censored By Margaret E. Roberts
Cover of Censored by margaret e. roberts

Censored

By Margaret E. Roberts

View Security for computer networks By D. W. Davies,Donald Watts Davies
Cover of Security for computer networks by d. w. davies,donald watts davies

Security for computer networks

By D. W. Davies,Donald Watts Davies

View Privatsphäre durch die Delegation von Rechten By Sven Wohlgemuth
Cover of Privatsphäre durch die Delegation von Rechten by sven wohlgemuth

Privatsphäre durch die Delegation von Rechten

By Sven Wohlgemuth

View Computer control and security By William E. Perry
Cover of Computer control and security by william e. perry

Computer control and security

By William E. Perry

View Computer security and protectionstructures By Bruce J. Walker
Cover of Computer security and protectionstructures by bruce j. walker

Computer security and protectionstructures

By Bruce J. Walker

View Secure data management By SDM 2005 (2005 Trondheim, Norway)
Cover of Secure data management by sdm 2005 (2005 trondheim, norway)

Secure data management

By SDM 2005 (2005 Trondheim, Norway)

View IT security governance guidebook with security program metrics on CD-ROM By Frederick B. Cohen

IT security governance guidebook with security program metrics on CD-ROM

IT security governance guidebook with security program metrics on CD-ROM

By Frederick B. Cohen

View Control and security of computer information systems By Philip E. Fites
Cover of Control and security of computer information systems by philip e. fites

Control and security of computer information systems

By Philip E. Fites

View Codes, ciphers, and computers By Bruce Bosworth
Cover of Codes, ciphers, and computers by bruce bosworth

Codes, ciphers, and computers

By Bruce Bosworth

View Sicherheitskonzepte im WWW By Stefan Nusser
Cover of Sicherheitskonzepte im WWW by stefan nusser

Sicherheitskonzepte im WWW

By Stefan Nusser

View Cross enterprise integration with SAP GRC Access Control By Raj Behera
Cover of Cross enterprise integration with SAP GRC Access Control by raj behera

Cross enterprise integration with SAP GRC Access Control

By Raj Behera

View Information and Communications Security By ICICS <12, 2010, Barcelona>
Cover of Information and Communications Security by icics <12, 2010, barcelona>

Information and Communications Security

By ICICS <12, 2010, Barcelona>

View Advances in information and computer security By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)
Cover of Advances in information and computer security by international workshop on security (3rd 2008 kagawa-gun, japan)

Advances in information and computer security

By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)

View Advances in information and computer security By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)

Advances in information and computer security

Advances in information and computer security

By International Workshop on Security (3rd 2008 Kagawa-gun, Japan)

View Privacy enhancing technologies By PET 2002 (2002 San Francisco, Calif.)
Cover of Privacy enhancing technologies by pet 2002 (2002 san francisco, calif.)

Privacy enhancing technologies

By PET 2002 (2002 San Francisco, Calif.)

View Information and communications security By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)
Cover of Information and communications security by international conference on information and communications security (9th 2007 zhengzhou shi, china)

Information and communications security

By International Conference on Information and Communications Security (9th 2007 Zhengzhou Shi, China)

View Computer Security – ESORICS 2009 By Michael Backes
Cover of Computer Security – ESORICS 2009 by michael backes

Computer Security – ESORICS 2009

By Michael Backes

View Ad-Hoc, Mobile and Wireless Networks By Pedro M. Ruíz
Cover of Ad-Hoc, Mobile and Wireless Networks by pedro m. ruíz

Ad-Hoc, Mobile and Wireless Networks

By Pedro M. Ruíz

View Identity and privacy in the Internet age By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)
Cover of Identity and privacy in the Internet age by nordic conference on secure it systems (14th 2009 oslo, norway)

Identity and privacy in the Internet age

By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)

View Identity and privacy in the Internet age By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)
Cover of Identity and privacy in the Internet age by nordic conference on secure it systems (14th 2009 oslo, norway)

Identity and privacy in the Internet age

By Nordic Conference on Secure IT Systems (14th 2009 Oslo, Norway)