1
by Speed, Tim
Published 2003
Digital Press
Table of Contents: ...The Internet and Security; The Security Review Process; Cryptography; Secure Networks; Protecting...

2
by Vacca, John R.
Published 2007
Springer US
Table of Contents: ...to Internet Security -- Internet Technologies -- Basic Security Issues -- Establishing Your...

3
Published 2018
Springer Nature Singapore
Table of Contents: ... security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection...

4
Published 2019
Springer Nature Singapore
Table of Contents: ... Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR...

5
by Cheswick, William, Bellovin, Steven, Rubin, Aviel
Published 2003
Addison-Wesley Professional
Subjects: ...Computer security / Management...

6
by Li, Shancang, Xu, Li D.
Published 2017
Syngress, an imprint of Elsevier
Table of Contents: ...1. Introduction: securing the Internet of Things -- 2. Security architecture in the Internet...

7
by Phoha, Vir V.
Published 2002
Springer New York
Table of Contents: ...Internet Security Terms -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O...

8
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... as Specifications of Access Policies -- Security Properties of Typed Applets -- Concepts -- The Role of Trust...

9
by Wu, Chuan-Kun
Published 2021
Springer Nature Singapore
Table of Contents: ...1 Introduction -- 2 Architectures of the Internet of Things -- 3 IoT security architecture -- 4...

10
by van Oorschot, Paul C.
Published 2021
Springer International Publishing
Table of Contents: ...1. Security Concepts and Principles -- 2. Cryptographic Building Blocks -- 3. User Authentication...

11
Published 2020
Springer Nature Singapore
Table of Contents: ...Mobile Internet Security -- Mobile Application and Security -- Vehicular Network Security -- Deep...

12
by van Oorschot, Paul C.
Published 2020
Springer International Publishing
Table of Contents: ..., Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security...

13
Published 2024
Springer Nature Singapore
Table of Contents: .... -- Network Design and Security. -- Intelligent Cooperative Routing for Services in Computing Integration...

14
Published 2023
Springer Nature Singapore
Table of Contents: ... Token-Based Access Control Mechanism for the Internet of Things Using Blockchain -- Cyber Security...

15
Published 2022
Springer Nature Singapore
Table of Contents: ...IoT and Cyber Security -- Blockchain Security -- Digital Forensic and Malware Analysis -- 5G...

16
by Mason, Andrew G.
Published 2001
Cisco Press
Table of Contents: ...pt. I. Internal Security Fundamentals -- Ch. 1. Internet Security -- Ch. 2. Basic Cisco Router...

17
by Jones, Robert
Published 2006
O'Reilly
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

18
by Dhanjani, Nitesh
Published 2015
O'Reilly
Table of Contents: ... on the Internet -- Exploiting Default Credentials -- Exploiting Dynamic DNS -- The Foscam Saga Continues...

19
by Pedro García Márquez, Fausto
Published 2021
IntechOpen
Subjects: ...iot, security, condition monitoring, privacy, data acquisition, cyber security...

20
Published 2017
Springer International Publishing
Table of Contents: ... and the Legacy Crypto API -- Risk and Security Analysis Methodology -- A Formal Verification of Safe Update Point...