2
by Armitage, Josh
Published 2022
O'Reilly Media, Inc
Subjects: ...Cloud computing / Security measures / fast...

3
Published 1983
Springer Vienna

4
by Chen, Hsinchun
Published 2006
Springer US
Table of Contents: ...Intelligence and Security Informatics (ISI): Challenges and Opportunities -- An ISI Research...

5
by Ghosh, Sumit
Published 2002
Springer New York
Table of Contents: ...6 Synthesis of Security Attack Models for ATM Networks -- 6.1 Brief Review of the Current...

6
Published 2007
Vieweg+Teubner Verlag
Table of Contents: ... Cards: New Security Challenges and Applications -- ID Cards in Practice -- Large Scale Fingerprint...

7
by Galloro, Giovanni, Avery, Nathaniel, Dorbin, David
Published 2024
Packt Publishing Ltd.
Table of Contents: ... -- Chapter 4: Securing Your Code with Cloud Workstations -- Technical requirements -- Introduction to Cloud...

8
by Kanneganti, Ramarao
Published 2008
Manning
Table of Contents: ...pt. I. SOA Basics -- 1. SOA requires new approaches to security -- 2. Getting started with web...

9
by Bond, James
Published 2015
[O'Reilly Media]
Subjects: ...Computer security...

10
by Shields, Dylan
Published 2022
Manning Publications
Subjects: ...Cloud computing / Security measures...

11
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... (Transcript of Discussion) -- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA...

12
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

13
Published 2011
Springer Berlin Heidelberg
... submissions and focuse on the various aspects of security technology...

14
Published 2009
Vieweg+Teubner Verlag
Table of Contents: ...Security Awareness: Von der Oldschool in die Next Generation – eine Einführung -- Definition von...

15
by Partida, Alberto, Andina, Diego
Published 2010
Springer Netherlands
Table of Contents: ...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...

16
Published 2010
Springer US
Table of Contents: ...Secure Metering Schemes -- A Cryptographic Framework for the Controlled Release Of Certified Data...