Items 31 - 45 of 72
1 2 3 4 5
Sort: 

Role Engineering for Enterprise Security Management
Role Engineering for Enterprise Security Management
Published: 30/11/2007
Pages: 256
Multimodal Surveillance: Sensors, Algorithms, and Systems
Multimodal Surveillance: Sensors, Algorithms, and Systems
By (author)s: Thomas Huang, Zhigang Zhu
Published: 31/07/2007
Pages: 446
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Published: 31/01/2007
Pages: 418
Security for Mobile Networks and Platforms
Security for Mobile Networks and Platforms
Published: 31/07/2006
Pages: 332
User's Guide to Cryptography and Standards
User's Guide to Cryptography and Standards
Published: 31/10/2004
Pages: 402
Outsourcing Information Security
Outsourcing Information Security
By (author): C. Warren Axelrod
Published: 30/09/2004
Pages: 266
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
Published: 30/09/2004
Pages: 364
Bluetooth Security
Bluetooth Security
Published: 31/05/2004
Pages: 222
A Practical Guide to Managing Information Security
A Practical Guide to Managing Information Security
By (author): Steve Purser
Published: 31/03/2004
Pages: 280
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
By (author): Jose Nazario
Published: 31/10/2003
Pages: 318
Multicast and Group Security
Multicast and Group Security
Published: 31/05/2003
Pages: 334
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition
By (author): Rolf Oppliger
Published: 31/10/2002
Pages: 444
Developing Secure Systems with CORBA
Developing Secure Systems with CORBA
By (author)s: Ulrich Lang, Rudolf Schreiner
Published: 31/01/2002
Pages: 332
1 2 3 4 5