Search alternatives:
"secularity" » "peculiarity", "regularity", "secularism"

1
by Wiles, Jack
Published 2007
Syngress
Table of Contents: ...Foreword -- Chapter 1: Physical Security: SCADA and the Critical Infrastructure's Biggest...

2
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

3
Published 2016
Springer Netherlands
Table of Contents: ... as the Threats for Human Security -- 25. Transmission of Three Resistance Sensor Signals over Four Wire Line...

4
by McGraw, Gary
Published 2006
Addison-Wesley
Subjects: ...Computer security...

5
by Theriault, Marlene
Published 1998
O'Reilly
Subjects: ...Database security / fast...

6
by Graff, Mark
Published 2003
O'Reilly
Subjects: ...Computer security...

7
by Shih, Frank Y.
Published 2013
CRC Press
Subjects: ...Multimedia communications / Security measures...

8
by Horn, Gunther
Published 2013
John Wiley & Sons
Table of Contents: ...GSM Security -- Third-Generation Security (UMTS) -- 3G WLAN Interworking -- EPS Security...

9
by Thornton, Frank
Published 2006
Syngress Pub.
.... RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses...

10
by Anderson, Ross
Published 2008
Wiley Publishing Inc.
Table of Contents: ...What is security engineering? -- Usability and psychology -- Protocols -- Access control...

11
by Bücker, Axel
Published 2013
IBM Corp., International Technical Support Organization
Subjects: ...Computer security / Management...

12
by Chapple, Mike
Published 2003
Que
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

13
by Bücker, Axel
Published 2011
IBM Corp., International Technical Support Organization
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

14
by Wilkins, Sean
Published 2011
Cisco Press
Subjects: ...Computer networks / Security measures / Examinations / fast...

15
by Shortridge, Kelly
Published 2023
Ascent Audio
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

16
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... and Directions -- Automating Event Extraction for the Security Domain -- Knowledge Discovery and Information...

17
by Grimes, Roger A.
Published 2007
Wiley Technology Pub.
Table of Contents: ...pt. I. Introducing Windows Vista -- 1. New security features -- 2. How hackers attack -- 3. Windows...

18
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

19
by Conheady, Sharon
Published 2014
McGraw-Hill Education
Subjects: ...Information technology / Security measures / fast...

20
by Allen, Julia H.
Published 2008
Addison-Wesley
Subjects: ...Computer security...