Books

7 results found
Title Authors Description OpenBook ID
Using the Common Criteria for IT Security Evaluation Using the Common Criteria for IT Security Evaluation Debra S Herrmann Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is a relatively … OL15189943W
Intelligence and security informatics Intelligence and security informatics Hsinchun Chen Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… OL16993316W
Wireless Algorithms, Systems, and Applications Wireless Algorithms, Systems, and Applications Kui Ren This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 rev… OL19911350W
Practical Cloud Security Practical Cloud Security Kevin L. Jackson,Greer, Jr., Melvin B. xxi, 238 pages ; 24 cm OL21278943W
Network security Network security Eric Maiwald "Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the be… OL5746288W
Computer Security and Cryptography Computer Security and Cryptography Alan G. Konheim Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data securit… OL6335110W
The Future of the Internet-And How to Stop It The Future of the Internet-And How to Stop It Jonathan L. Zittrain This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting … OL9381421W