1
by Bishop, Matthew A.
Published 2002
Addison Wesley Professional
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

2
by Bishop, Matt, Sullivan, Elisabeth, Ruppel, Michelle
Published 2019
Addison-Wesley
Table of Contents: ...Part I: Introduction: An Overview of Computer Security -- Part II: Foundations: Access Control...

3
Published 2020
Springer International Publishing
... 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020...

4
Published 2020
Springer International Publishing
... with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers...

5
Published 2019
Springer International Publishing
... in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer...

6
Published 2018
Springer International Publishing
... European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September...

7
Published 2018
Springer International Publishing
... European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September...

8
Published 2020
Springer International Publishing
..., Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer...

9
Published 2020
Springer International Publishing
..., in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS...

10
Published 2018
Springer International Publishing
... on Research in Computer Security, ESORICS 2017. The CyberICPS Workshop received 32 submissions from which 10...

11
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens -- Data...

12
by Bishop, Matt
Published 2004
Addison Wesley Professional
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

13
by Lehtinen, Rick
Published 2006
O'Reilly
Subjects: ...Computer security...

14
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ...Introduction to computer security -- Networks and the internet -- Cyber stalking, fraud, and abuse...

15
by Easttom, Chuck
Published 2016
Pearson
Subjects: ...Computer security...

16
by Jacobson, Douglas, Idziorek, Joseph
Published 2016
Chapman and Hall/CRC
Subjects: ...Computer security / http://id.loc.gov/authorities/subjects/sh90001862...

17
Published 2017
CRC Press
Table of Contents: ..., and Kun Sun -- Cloud computing security essentials and architecture / Michaela Iorga and Anil Karmel...

18
by Konheim, Alan G.
Published 2007
Wiley-Interscience
Table of Contents: ...COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1...

19
by Conklin, Wm. Arthur, White, Gregory B., Cothren, Chuck, Davis, Roger
Published 2018
McGraw-Hill Education
Subjects: ...Computer security / Examinations / Study guides...

20
by Salomon, David
Published 2010
Springer London
Subjects: ...Computer security...