Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-19
|
Table of contents of journal:
Results: 19
Fundamentals of computer security
Authors:
Fisch, EA White, GB
Citation:
Ea. Fisch et Gb. White, Fundamentals of computer security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 1-9
Risk assessment and mitigation
Citation:
Risk assessment and mitigation, SECURE COMPUTERS AND NETWORKS, 2000, pp. 11-22
Developing secure computer systems
Citation:
Developing secure computer systems, SECURE COMPUTERS AND NETWORKS, 2000, pp. 23-34
Security models
Citation:
Security models, SECURE COMPUTERS AND NETWORKS, 2000, pp. 35-52
User authentication
Citation:
User authentication, SECURE COMPUTERS AND NETWORKS, 2000, pp. 53-71
Access and information flow controls
Citation:
Access and information flow controls, SECURE COMPUTERS AND NETWORKS, 2000, pp. 73-87
Auditing and intrusion detection
Citation:
Auditing and intrusion detection, SECURE COMPUTERS AND NETWORKS, 2000, pp. 89-114
Damage control and assessment
Citation:
Damage control and assessment, SECURE COMPUTERS AND NETWORKS, 2000, pp. 115-136
Database security
Citation:
Database security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 137-149
Network security
Citation:
Network security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 151-176
Secure Electronic Commerce
Citation:
Secure Electronic Commerce, SECURE COMPUTERS AND NETWORKS, 2000, pp. 177-189
World Wide Web (WWW) security
Citation:
World Wide Web (WWW) security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 191-206
Firewalls
Citation:
Firewalls, SECURE COMPUTERS AND NETWORKS, 2000, pp. 207-223
Cryptography
Citation:
Cryptography, SECURE COMPUTERS AND NETWORKS, 2000, pp. 225-262
Malicious code
Citation:
Malicious code, SECURE COMPUTERS AND NETWORKS, 2000, pp. 263-289
Security standards
Citation:
Security standards, SECURE COMPUTERS AND NETWORKS, 2000, pp. 291-310
Case studies
Citation:
Case studies, SECURE COMPUTERS AND NETWORKS, 2000, pp. 311-327
Information warfare
Citation:
Information warfare, SECURE COMPUTERS AND NETWORKS, 2000, pp. 329-344
UNIX security
Citation:
UNIX security, SECURE COMPUTERS AND NETWORKS, 2000, pp. 345-359
Risultati:
1-19
|