Collections

 First Page   Previous   1   2   3   4   5   Next   Last Page 
Handbook on securing cyber-physical critical infrastructure: foundations and challenges

Handbook on securing cyber-physical critical infrastructure: foundations and challenges

Availability : 1 copies available for loan
Data analysis for cyber-security

Data analysis for cyber-security

Availability : 1 copies available for loan
Formal models and techniques for analyzing security protocols

Formal models and techniques for analyzing security protocols

Availability : 1 copies available for loan
Automated reasoning for security protocol analysis and issues in the theory of security

Automated reasoning for security protocol analysis and issues in the theory of security

Availability : 1 copies available for loan
Information security risk assessment toolkit: practical assessments through data collection and data analysis

Information security risk assessment toolkit: practical assessments through data collection and data analysis

Availability : 1 copies available for loan
Cybersecurity for dummies

Cybersecurity for dummies

Availability : 1 copies available for loan
Securing digital video : techniques for DRM and content protection

Securing digital video : techniques for DRM and content protection

Availability : 1 copies available for loan
FISMA compliance handbook : 2nd edition

FISMA compliance handbook : 2nd edition

Availability : 1 copies available for loan
 First Page   Previous   1   2   3   4   5   Next   Last Page