|
Using the Common Criteria for IT Security Evaluation
|
Debra S Herrmann |
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is a relatively … |
OL15189943W |
|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Wireless Algorithms, Systems, and Applications
|
Kui Ren |
This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 rev… |
OL19911350W |
|
Practical Cloud Security
|
Kevin L. Jackson,Greer, Jr., Melvin B. |
xxi, 238 pages ; 24 cm |
OL21278943W |
|
Network security
|
Eric Maiwald |
"Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the be… |
OL5746288W |
|
Computer Security and Cryptography
|
Alan G. Konheim |
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data securit… |
OL6335110W |
|
The Future of the Internet-And How to Stop It
|
Jonathan L. Zittrain |
This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting … |
OL9381421W |