Search ResultsElectronic Resources 
by
Bradley, Tony, 1969-
ScienceDirect https://www.sciencedirect.com/science/book/9781597491143
Format:
Excerpt:
Computers -- Access control -- Passwords.
by
Beale, Jay.
ScienceDirect https://www.sciencedirect.com/science/book/9781597490993
Format:
Excerpt:
Computers -- Access control.
by
Ransome, James.
Format:
Excerpt:
control and manage a secure software development process in the form of best practices and metrics
by
Mao, Wenji.
ScienceDirect http://www.sciencedirect.com/science/book/9780123972002
Format:
Excerpt:
Parallel Control -- Part 4. Socio-Cultural Computing and ISI: A Synthesis -- 7. Social Computing in ISI: An
by
Andress, Jason.
ScienceDirect http://www.sciencedirect.com/science/book/9781597496537
Format:
Excerpt:
. Authorization and Access control Chapter 4. Auditing and Accountability Chapter 5. Cryptography Chapter 6
by
Andress, Jason.
ScienceDirect https://www.sciencedirect.com/science/book/9781597496537
Format:
Excerpt:
. Authorization and Access control Chapter 4. Auditing and Accountability Chapter 5. Cryptography Chapter 6
by
Cole, Eric.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490481
Format:
Excerpt:
Insider Threat; Chapter 9 Response: Technologies That Can Be Used to Control the Insider Threat; Chapter
by
Wotring, Brian.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490184
Format:
Excerpt:
changes. In other words, it's change control in a potentially hostile environment. Best of all, this book
by
Winkler, J. R. (Joachim R.)
ScienceDirect http://www.sciencedirect.com/science/book/9781597495929
Format:
Excerpt:
fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know
by
Fair, Ted.
ScienceDirect https://www.sciencedirect.com/science/book/9781931836418
Format:
Excerpt:
control -- Spying on the PC -- Spying on Web browsing -- Spying on e-mail -- Spying on chat and instant
by
131ah.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836050
Format:
Excerpt:
Control yourself / The lagos creeper / Product of fate: the evolution of a hacker / A real gullible
by
Shein, Rob.
ScienceDirect http://www.sciencedirect.com/science/book/9781931836098
Format:
Excerpt:
8. Exploit Impact; Chapter 9. Damage Control; Chapter 10. Recovery; Appendix: The Laws of Security

Select an Action





