Trust and security in collaborative computing
Guardat en:
Autor principal: | Zou, Xukai, 1963- |
---|---|
Autor corporatiu: | ebrary, Inc |
Altres autors: | Dai, Yuan-Shun, Pan, Yi, 1960- |
Format: | Electrònic eBook |
Idioma: | anglès |
Publicat: |
Hackensack, NJ :
World Scientific,
c2008.
|
Col·lecció: | Computer and network security ;
v. 2. |
Matèries: | |
Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars
Trust and security in collaborative computing
per: Zou, Xukai, 1963-
Publicat: (2008)
per: Zou, Xukai, 1963-
Publicat: (2008)
Computer security fundamentals /
per: Easttom, Chuck
Publicat: (2006)
per: Easttom, Chuck
Publicat: (2006)
Computer security fundamentals /
per: Easttom, Chuck
Publicat: (2006)
per: Easttom, Chuck
Publicat: (2006)
Microsoft System Center Data Protection Manager 2012 SP1 learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /
per: Buchanan, Steve
Publicat: (2013)
per: Buchanan, Steve
Publicat: (2013)
Microsoft System Center Data Protection Manager 2012 SP1 learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /
per: Buchanan, Steve
Publicat: (2013)
per: Buchanan, Steve
Publicat: (2013)
Fuzzing for software security testing and quality assurance
per: Takanen, Ari
Publicat: (2008)
per: Takanen, Ari
Publicat: (2008)
Fuzzing for software security testing and quality assurance
per: Takanen, Ari
Publicat: (2008)
per: Takanen, Ari
Publicat: (2008)
Computer and information security handbook
Publicat: (2013)
Publicat: (2013)
Computer and information security handbook
Publicat: (2013)
Publicat: (2013)
Securing the cloud cloud computer security techniques and tactics /
per: Winkler, J. R. (Joachim R.)
Publicat: (2011)
per: Winkler, J. R. (Joachim R.)
Publicat: (2011)
Securing the cloud cloud computer security techniques and tactics /
per: Winkler, J. R. (Joachim R.)
Publicat: (2011)
per: Winkler, J. R. (Joachim R.)
Publicat: (2011)
Mastering network security
per: Brenton, Chris
Publicat: (2003)
per: Brenton, Chris
Publicat: (2003)
Mastering network security
per: Brenton, Chris
Publicat: (2003)
per: Brenton, Chris
Publicat: (2003)
Web commerce security design and development /
per: Nahari, Hadi
Publicat: (2011)
per: Nahari, Hadi
Publicat: (2011)
Web commerce security design and development /
per: Nahari, Hadi
Publicat: (2011)
per: Nahari, Hadi
Publicat: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
per: Mularien, Peter
Publicat: (2010)
per: Mularien, Peter
Publicat: (2010)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
per: Mularien, Peter
Publicat: (2010)
per: Mularien, Peter
Publicat: (2010)
Managing information security
Publicat: (2010)
Publicat: (2010)
Managing information security
Publicat: (2010)
Publicat: (2010)
Computer and information security handbook
Publicat: (2009)
Publicat: (2009)
Computer and information security handbook
Publicat: (2009)
Publicat: (2009)
Protecting games a security handbook for game developers and publishers /
per: Davis, Steven B.
Publicat: (2008)
per: Davis, Steven B.
Publicat: (2008)
Protecting games a security handbook for game developers and publishers /
per: Davis, Steven B.
Publicat: (2008)
per: Davis, Steven B.
Publicat: (2008)
Computer viruses and other malicious software a threat to the Internet economy.
Publicat: (2009)
Publicat: (2009)
Computer viruses and other malicious software a threat to the Internet economy.
Publicat: (2009)
Publicat: (2009)
SQL injection attacks and defense
per: Clarke, Justin
Publicat: (2012)
per: Clarke, Justin
Publicat: (2012)
SQL injection attacks and defense
per: Clarke, Justin
Publicat: (2012)
per: Clarke, Justin
Publicat: (2012)
The essential guide to home computer security
per: Rowlingson, Robert R.
Publicat: (2011)
per: Rowlingson, Robert R.
Publicat: (2011)
The essential guide to home computer security
per: Rowlingson, Robert R.
Publicat: (2011)
per: Rowlingson, Robert R.
Publicat: (2011)
Threat modeling : designing for security /
per: Shostack, Adam
Publicat: (2014)
per: Shostack, Adam
Publicat: (2014)
Threat modeling : designing for security /
per: Shostack, Adam
Publicat: (2014)
per: Shostack, Adam
Publicat: (2014)
The misuse of information systems the impact of security countermeasures /
per: D'Arcy, John P., 1975-
Publicat: (2007)
per: D'Arcy, John P., 1975-
Publicat: (2007)
The misuse of information systems the impact of security countermeasures /
per: D'Arcy, John P., 1975-
Publicat: (2007)
per: D'Arcy, John P., 1975-
Publicat: (2007)
Hacking the code ASP. NET web application security /
per: Burnett, Mark (Mark M.)
Publicat: (2004)
per: Burnett, Mark (Mark M.)
Publicat: (2004)
Hacking the code ASP. NET web application security /
per: Burnett, Mark (Mark M.)
Publicat: (2004)
per: Burnett, Mark (Mark M.)
Publicat: (2004)
Cyber security and IT infrastructure protection /
Publicat: (2014)
Publicat: (2014)
Cyber security and IT infrastructure protection /
Publicat: (2014)
Publicat: (2014)
Security architect : careers in information security /
per: Collins, Jon
Publicat: (2014)
per: Collins, Jon
Publicat: (2014)
Security architect : careers in information security /
per: Collins, Jon
Publicat: (2014)
per: Collins, Jon
Publicat: (2014)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
per: Bradley, Tony
Publicat: (2006)
per: Bradley, Tony
Publicat: (2006)
Ítems similars
-
Trust and security in collaborative computing
per: Zou, Xukai, 1963-
Publicat: (2008) -
Computer security fundamentals /
per: Easttom, Chuck
Publicat: (2006) -
Computer security fundamentals /
per: Easttom, Chuck
Publicat: (2006) -
Microsoft System Center Data Protection Manager 2012 SP1 learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /
per: Buchanan, Steve
Publicat: (2013) -
Microsoft System Center Data Protection Manager 2012 SP1 learn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /
per: Buchanan, Steve
Publicat: (2013)