Ir para o conteúdo
VuFind
Entrar
Idioma
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Sámegiella
Монгол
Māori
Palavra solta
Título
Autor
Assunto
Área/Cota
ISBN/ISSN
Tag
Pesquisar
Avançada
Channels
Formal models and techniques for analyzing security protocols
Search for more channels:
Registos relacionados: Formal models and techniques for analyzing security protocols
Channel Options
Ver Registo
Explore related channels
Quick Look
Formal logical methods for system security and correctness
Quick Look
Homeland security techniques and technologies
Quick Look
Threat modeling : designing for security /
Quick Look
Security 2020 reduce security risks this decade /
Quick Look
Modelling cyber security approaches, methodology, strategies /
Quick Look
Mastering network security
Quick Look
Computer security fundamentals /
Quick Look
Computer security /
Quick Look
Web commerce security design and development /
Quick Look
Managing information security
Quick Look
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
Quick Look
Security architect : careers in information security /
Quick Look
Introduction to computer security /
Quick Look
Linux security
Quick Look
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
Quick Look
Trust and security in collaborative computing
Quick Look
Data-driven security : analysis, visualization and dashboards /
Quick Look
Security in distributed, grid, mobile, and pervasive computing /
Quick Look
Security secrets, intruders and ID tags.
Quick Look
Computer and information security handbook
Quick Look
Cyber security and IT infrastructure protection /
Quick Look
Programmer's ultimate security deskref
Quick Look
Part-themed issue on internet security
Quick Look
Security intelligence : a practitioner's guide to solving enterprise security challenges /
Load more items
Assunto: Computer security.
Channel Options
Show items as search results
Explore related channels
Quick Look
Computers, ethics, and society /
Quick Look
Hack proofing ColdFusion
Quick Look
Configuring ISA server 2000 building firewalls for windows 2000 /
Quick Look
Hack proofing Sun Solaris 8
Quick Look
Hack proofing XML
Quick Look
Hack proofing your Web applications the only way to stop a hacker is to think like one /
Quick Look
Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one /
Quick Look
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Quick Look
Hack proofing Windows 2000
Quick Look
Check Point NG next generation security administration /
Quick Look
Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting /
Quick Look
Snort 2.0 intrusion detection
Quick Look
Computer security : Principles and practice /
Quick Look
Technology and privacy the new landscape /
Quick Look
How to cheat at designing security for a Windows Server 2003 network
Quick Look
How to cheat at Configuring ISA Server 2004
Quick Look
Dictionary of information security
Quick Look
Mastering network security
Quick Look
Combating spyware in the enterprise
Quick Look
Essential computer security everyone's guide to e-mail, internet, and wireless security /
Quick Look
Trusted platform module basics using TPM in embedded systems /
Quick Look
Stealing the network how to own a shadow /
Quick Look
Developer's guide to web application security
Quick Look
Part-themed issue on internet security
Load more items
Autor: ebrary, Inc
Channel Options
Show items as search results
Explore related channels
Quick Look
Leadership debate
Quick Look
Performance measurement and performance management
Quick Look
Discourse and organizational change
Quick Look
Benchmarking in health
Quick Look
Knowledge sharing
Quick Look
HRM and job performance incentives
Quick Look
Human gross anatomy an outline text /
Quick Look
Consumer food safety
Quick Look
Education and training perspectives in a small business context
Quick Look
Including a special section issues from multimedia gaming technology /
Quick Look
Retailing and producer-retailer relationships in the food chain papers from the 88th EAAE seminar, Paris 2004 /
Quick Look
Trade union development in central and Eastern Europe ""the velvet revolution"" European Union accession and beyond /
Quick Look
Website usability research and case studies.
Quick Look
Open source software
Quick Look
Arts-based learning for business
Quick Look
International journal of social economics.
Quick Look
25th anniversary special issue
Quick Look
Politics and government in the age of the internet
Quick Look
Technology innovation and HRM
Quick Look
Demographic change and the fashion market
Quick Look
Disability issues and libraries a Scottish perspective /
Quick Look
Benchmarking in health
Quick Look
Managing relationships, networks, and complexity in innovation, diffusion, and adoption processes
Quick Look
Workplace learning from the learner's perspective /
Load more items
Ver Registo
Anterior
Explore related channels
Seguinte