Five dimensions of information security awareness
ACM SIGCAS Computers and Society
A novel computer architecture to prevent destruction by viruses
Journal of Computer Science and Technology
SECURE: A Simulation Tool for PKI Design
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
Hi-index | 0.00 |
From the Publisher:Internet Security Professional Reference, Second Edition takes you through planning, implementing, and administering a secure Internet connection - from understanding UUCP and auditing to encryption and firewalls to understanding viruses - this book has everything you need. A comprehensive resource for security and network professionals alike, Internet Security Professional Reference, Second Edition will show you how to use and implement the latest technologies in the most secure fashion, including Java, CGI, and Windows NT.