Security in distributed, grid, mobile, and pervasive computing /
Sábháilte in:
Príomhchruthaitheoir: | Xiao, Yang (Údar) |
---|---|
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Boca Raton, FL :
Auerbach Publishers,
[2007]
|
Ábhair: | |
Rochtain ar líne: | Click to View |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go /
de réir: Speed, Tim
Foilsithe / Cruthaithe: (2013)
de réir: Speed, Tim
Foilsithe / Cruthaithe: (2013)
Citrix xenmobile mobile device management : gain an insight into the industry's best and most secure : enterprise mobility management solution /
de réir: Phoenix, Akash
Foilsithe / Cruthaithe: (2014)
de réir: Phoenix, Akash
Foilsithe / Cruthaithe: (2014)
IBM worklight mobile application development essentials : develop efficient mobile applications using IBM Worklight /
de réir: Uddin, Muhammad Saif
Foilsithe / Cruthaithe: (2014)
de réir: Uddin, Muhammad Saif
Foilsithe / Cruthaithe: (2014)
Android security internals : an in-depth guide to android's security architecture /
de réir: Elenkov, Nikolay
Foilsithe / Cruthaithe: (2015)
de réir: Elenkov, Nikolay
Foilsithe / Cruthaithe: (2015)
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
Trust and security in collaborative computing
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
Computer and information security handbook
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Securing the cloud cloud computer security techniques and tactics /
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
Security in distributed and networking systems
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Web commerce security design and development /
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Pervasive computing and networking
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
Distributed systems security issues, processes, and solutions /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Mastering network security
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
Managing information security
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Security architect : careers in information security /
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
Securing HP NonStop servers in an open systems world TCP/IP, OSS & SQL /
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Part-themed issue on internet security
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Computer and information security handbook
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Applied cyber security and the smart grid implementing security controls into the modern power infrastructure /
de réir: Knapp, Eric D.
Foilsithe / Cruthaithe: (2013)
de réir: Knapp, Eric D.
Foilsithe / Cruthaithe: (2013)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
de réir: Woody, Aaron
Foilsithe / Cruthaithe: (2013)
de réir: Woody, Aaron
Foilsithe / Cruthaithe: (2013)
Computer viruses and other malicious software a threat to the Internet economy.
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
The essential guide to home computer security
de réir: Rowlingson, Robert R.
Foilsithe / Cruthaithe: (2011)
de réir: Rowlingson, Robert R.
Foilsithe / Cruthaithe: (2011)
Cyber security and IT infrastructure protection /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Threat modeling : designing for security /
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
The misuse of information systems the impact of security countermeasures /
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
Fuzzing for software security testing and quality assurance
de réir: Takanen, Ari
Foilsithe / Cruthaithe: (2008)
de réir: Takanen, Ari
Foilsithe / Cruthaithe: (2008)
Security secrets, intruders and ID tags.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
Hacking the code ASP. NET web application security /
de réir: Burnett, Mark (Mark M.)
Foilsithe / Cruthaithe: (2004)
de réir: Burnett, Mark (Mark M.)
Foilsithe / Cruthaithe: (2004)
Network and security issues for internet mobile entertainment
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Computer security /
de réir: Gollmann, Dieter
Foilsithe / Cruthaithe: (2006)
de réir: Gollmann, Dieter
Foilsithe / Cruthaithe: (2006)
Toward a safer and more secure cyberspace
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Pervasive information systems
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
The secure online business handbook a practical guide to risk management and business continuity /
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Computer Forensics jumpstart
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Securing information and communications systems principles, technologies, and applications /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Security for mobile networks and platforms
de réir: Aissi, Selim
Foilsithe / Cruthaithe: (2006)
de réir: Aissi, Selim
Foilsithe / Cruthaithe: (2006)
Innocent code a security wake-up call for Web programmers /
de réir: Huseby, Sverre H.
Foilsithe / Cruthaithe: (2004)
de réir: Huseby, Sverre H.
Foilsithe / Cruthaithe: (2004)
Cloud security a comprehensive guide to secure cloud computing /
de réir: Krutz, Ronald L.
Foilsithe / Cruthaithe: (2010)
de réir: Krutz, Ronald L.
Foilsithe / Cruthaithe: (2010)
Míreanna comhchosúla
-
Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go /
de réir: Speed, Tim
Foilsithe / Cruthaithe: (2013) -
Citrix xenmobile mobile device management : gain an insight into the industry's best and most secure : enterprise mobility management solution /
de réir: Phoenix, Akash
Foilsithe / Cruthaithe: (2014) -
IBM worklight mobile application development essentials : develop efficient mobile applications using IBM Worklight /
de réir: Uddin, Muhammad Saif
Foilsithe / Cruthaithe: (2014) -
Android security internals : an in-depth guide to android's security architecture /
de réir: Elenkov, Nikolay
Foilsithe / Cruthaithe: (2015) -
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)