1 |
|
Architectures and protocols for secure information technology infrastructures [electronic resource] /
|
Martinez, Antonio Ruiz Garcia, Fernando Pereniguez Marin-Lopez, Rafael
|
Information Science Reference, an imprint of IGI Global
|
2014
|
|
|
2 |
|
At the nexus of cybersecurity and public policy : some basic concepts and issues /
|
Clark, David D. Berson, T. A. Lin, Herbert
|
|
2014
|
|
|
3 |
|
Best practices in computer network defense : incident detection and response /
|
NATO Advanced Research Workshop on Best Practices for Computer Network Defense: Incident Detection and Response (2013 : Geneva, Switzerland)
|
|
2014
|
|
|
4 |
|
Information security auditor /
|
Goucher, Wendy
|
|
2016
|
|
|
5 |
|
Digital identity and access management : technologies and frameworks / [electronic resource]
|
Sharman, Raj. Smith, Sanjukta Das Gupta, Manish
|
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
|
2012
|
|
|
6 |
|
Security, design, and architecture for broadband and wireless network technologies [electronic resource] /
|
Chilamkurti, Naveen
|
Information Science Reference
|
2013
|
|
|
7 |
|
Frontiers of engineering : reports on leading-edge engineering from the 2015 symposium /
|
US Frontiers of Engineering Symposium. author (2015 : Irvine, Calif.),
|
The National Academies Press
|
2016
|
|
|
8 |
|
Developing and evaluating security-aware software systems [electronic resource] /
|
Khan, Khaled M.
|
Information Science Reference
|
2013
|
|
|
9 |
|
Theory and practice of cryptography solutions for secure information systems [electronic resource] /
|
Elc偈i, Atilla
|
Information Science Reference
|
2013
|
|
|
10 |
|
Security architect : careers in information security / [electronic resource]
|
Collins, Jon
|
|
2014
|
|
|