Top 1200 security computer networks PDF Book Page 29

book image

Palo Alto Networks

93 Pages
·2012
·9.26 MB

book image

Network Security Policy

Greg Lamb
·115 Pages
·2015
·1.47 MB

book image

Hacking Wireless Networks For Dummies

Kevin Beaver
·387 Pages
·2005
·14.18 MB

book image

Global Networks and Local Values: A Comparative Look at Germany and the United States

Computer Science and Telecommunications Board, National Reseach Council
·260 Pages
·2002
·4.7 MB

book image

Computer Security – ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

Thorsten Holz, Markus Engelberth, Felix Freiling (auth.), Michael Backes, Peng Ning (eds.)
·718 Pages
·2009
·9.918 MB

book image

Computer Science: Reflections On The Field, Reflections From Field

Committee on the Fundamentals of Computer Science: Challenges and Opportunities
·217 Pages
·2004
·5.36 MB

book image

Strategic Cyber Security

Geers K.
·169 Pages
·2.649 MB

book image

IEEE Standard Glossary of Computer Hardware Terminology

IEEE Computer Society. Standards Coordinating Committee
·109 Pages
·1995
·7.517 MB

book image

Data Science and Security: Proceedings of IDSCS 2021 (Lecture Notes in Networks and Systems, 290)

Samiksha Shukla (editor), Aynur Unal (editor), Joseph Varghese Kureethara (editor), Durgesh Kumar Mishra (editor), Dong Seog Han (editor)
·503 Pages
·2021
·15.97 MB

book image

Security and privacy preserving in social networks

Elie Raad, Richard Chbeir (auth.), Richard Chbeir, Bechara Al Bouna (eds.)
·373 Pages
·2013
·7.923 MB

book image

Body area networks: safety, security, and sustainability

Gupta, Sandeep K. S.;Mukherjee, Tridib;Venkatasubramanian, Krishna Kumar
·161 Pages
·2013
·2.372 MB

book image

Security-aware Cooperation in Cognitive Radio Networks

Ning Zhang, Jon W. Mark (auth.)
·84 Pages
·2014
·1.914 MB

book image

[ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)

ISO/IEC JTC 1/SC 27 Information security cybersecurity privacy protection
·154 Pages
·2008
·0.997 MB

book image

Parallel Computer Architecture

David E. Culler
·877 Pages
·1998
·4 MB

book image

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

Jerzy Pejas, Andrzej Piegat (Editors)
·394 Pages
·2004
·24.286 MB

book image

Personal Digital Security

Michael, Bazzell
·214 Pages
·2016
·4.19 MB

1
282930
50