Search alternatives:
secularity » peculiarity, regularity

1
by Wiles, Jack
Published 2007
Syngress
Table of Contents: ...Foreword -- Chapter 1: Physical Security: SCADA and the Critical Infrastructure's Biggest...

2
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

3
Published 2016
Springer Netherlands
Table of Contents: ... as the Threats for Human Security -- 25. Transmission of Three Resistance Sensor Signals over Four Wire Line...

4
by McGraw, Gary
Published 2006
Addison-Wesley
Subjects: ...Computer security...

5
by Theriault, Marlene
Published 1998
O'Reilly
Subjects: ...Database security / fast...

6
by Horn, Gunther
Published 2013
John Wiley & Sons
Table of Contents: ...GSM Security -- Third-Generation Security (UMTS) -- 3G WLAN Interworking -- EPS Security...

7
by Shih, Frank Y.
Published 2013
CRC Press
Subjects: ...Multimedia communications / Security measures...

8
by Graff, Mark
Published 2003
O'Reilly
Subjects: ...Computer security...

9
by Anderson, Ross
Published 2008
Wiley Publishing Inc.
Table of Contents: ...What is security engineering? -- Usability and psychology -- Protocols -- Access control...

10
by Thornton, Frank
Published 2006
Syngress Pub.
.... RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses...

11
by Bücker, Axel
Published 2013
IBM Corp., International Technical Support Organization
Subjects: ...Computer security / Management...

12
by Chapple, Mike
Published 2003
Que
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

13
by Bücker, Axel
Published 2011
IBM Corp., International Technical Support Organization
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

14
by Wilkins, Sean
Published 2011
Cisco Press
Subjects: ...Computer networks / Security measures / Examinations / fast...

15
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... and Directions -- Automating Event Extraction for the Security Domain -- Knowledge Discovery and Information...

16
by Jaworski, Jamie
Published 2000
Sams
Subjects: ...Computer security...

17
by Allen, Julia H.
Published 2008
Addison-Wesley
Subjects: ...Computer security...

18
by Conheady, Sharon
Published 2014
McGraw-Hill Education
Subjects: ...Information technology / Security measures / fast...

19
by Pearson, Robert L.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Electronic Alarm Systems -- Chapter 5Fire Systems -- Chapter 6Exterior and Interior Security Sensors...

20
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...