Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
by Speed, Tim
Published 2003
Digital Press
Table of Contents: ...The Internet and Security; The Security Review Process; Cryptography; Secure Networks; Protecting...

2
by Nahari, Hadi
Published 2011
Wiley Pub.
Table of Contents: ...I: Overview of commerce -- Internet era: E-commerce -- Mobile commerce -- Important "ilities...

3
by Savage, Michelle
Published 2013
Peachpit
Subjects: ...Computer security...

4
by Abel, John
Published 2007
McGraw-Hill
Subjects: ...Bases de données / Sécurité / Mesures...

5
by Niemietz, Marcus
Published 2012
dpunkt.verlag
Table of Contents: ...8.5 JavaScript deaktivieren8.5.1 Beschränkte Frames im Internet Explorer; 8.5.2 Das sandbox...

6
by Doraiswamy, Arvind
Published 2009
IT Governance Publishing
Subjects: ...Computer security...

7
by Kendrick, Rupert
Published 2010
IT Governance Pub.
Subjects: ...Internet / Sécurité / Mesures...

8
by Doraiswamy, Arvind
Published 2009
IT Governance Pub.
Table of Contents: ...1. Approach to security testing -- 2. Basic tests and techniques -- 3. The tools of the trade -- 4...

9
Published 2001
Springer US
Table of Contents: ...I Case Studies in E-Commerce Security -- 1 Security Testing of an Online Banking Service -- 2...

10
by Buecker, Axel
Published 2011
IBM Corp., International Technical Support Organization
Subjects: ...Computer security / Management...

11
Published 2021
O'Reilly Media, Inc.
Subjects: ...Electronic commerce / Security measures...

12
by Bîrjoveanu, Cătălin V., Bîrjoveanu, Mirela
Published 2022
Springer International Publishing
Subjects: ...Security Services...

13
Published 2021
Springer International Publishing
Table of Contents: ... Comparison -- Usability Assessment of a Jurisprudence System -- Inside-out: How Internal Social Media...

14
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ...pt. 1. Web technology. The web security landscape -- The architecture of the World Wide Web...

16
by Fitzgerald, Todd
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Getting information security right : top to bottom -- ch. 2. Developing information security...

17
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...ICE-B -- Towards Automated Service Trading -- SAGA: An Adaptive Infrastructure for Secure Available...

19
by Bücker, Axel
Published 2006
IBM, International Technical Support Organization
Subjects: ...Computer security...

20
by Kohlert, Helmut, Delany, Michael J., Regier, Ingo
Published 1999
Springer Berlin Heidelberg
Table of Contents: ...12.1 Der Security Interest und seine Bedeutung -- 12.2 Die Anmeldung bzw. Perfection eines Security...