Database security
Computer crime: a crimefighter's handbook
Computer crime: a crimefighter's handbook
Web security & commerce
WIDE workflow development methodology
WACC '99 Proceedings of the international joint conference on Work activities coordination and collaboration
The CERT guide to system and network security practices
The CERT guide to system and network security practices
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Managing Workflow Authorization Constraints through Active Database Technology
Information Systems Frontiers
Guest Editor's Introduction: Cooperative Information Systems
IEEE Expert: Intelligent Systems and Their Applications
Integrating Data Mining Techniques with Intrusion Detection Methods
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Developing E-Services for Composing E-Services
CAiSE '01 Proceedings of the 13th International Conference on Advanced Information Systems Engineering
Discovery of Multi-Level Security Policies
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Designing wrapper components for e-services in integrating heterogeneous systems
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
This chapter is a topical overview of network security software and related skills needed by network users, IT professionals, and network security specialists. Covered topics are protection against viruses and other malicious programs, firewall software, ...