| 14041 |
|
|
Securing Cisco IOS Networks |
2004 | •• |
| 29588 |
|
Macaulay T. |
Securing Converged IP Networks: New Requirements for ICT Security and Assurance |
2006 | •• |
| 10181 |
|
|
Securing data on the Web |
2001 | •• |
| 142565 |
|
Lukszo Z., Deconinck G., Weijnen M. |
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) |
2010 | •• |
| 76131 |
|
Piccard P.L. |
Securing IM and P2P Applications for the Enterprise |
2005 | •• |
| 152846 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
| 176725 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
| 27172 |
|
Brotzman L. (Ed), Ranch D. (Ed) |
Securing Linux Step by Step |
1999 | •• |
| 24827 |
|
Koconis D., Murray J. |
Securing Linux: A Survival Guide for Linux Security |
2003 | •• |
| 12484 |
|
Krutz R.L. |
Securing SCADA Systems |
2005 | •• |
| 55304 |
|
Kizza F.M. |
Securing the Information Infrastructure |
2007 | •• |
| 166109 |
|
Kizza J., Kizza F. |
Securing the Information Infrastructure |
2008 | •• |
| 58051 |
|
Ness L. |
Securing Utility and Energy Infrastructures |
2006 | •• |
| 29589 |
|
Thermos P., Takanen A. |
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures |
2007 | •• |
| 22962 |
|
Rosenberg J., Remy D. |
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption |
2004 | •• |
| 26602 |
|
Shawgo J. |
Securing Windows 2000 Step-by-Step, Vol. 5 |
2001 | •• |
| 19457 |
|
Danseglio M. |
Securing Windows Server 2003 |
2004 | •• |
| 152503 |
|
Liu R., Trappe W. |
Securing Wireless Communications at the Physical Layer |
2009 | •• |
| 24022 |
|
Held J. |
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User |
2003 | •• |
| 13287 |
|
Abelar G. |
Securing Your Business with Cisco ASA and PIX Firewalls |
2005 | •• |
| 29673 |
|
Miller D.R., Gregg M. |
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills |
2007 | •• |
| 198286 |
|
Graham B., Dodd D. |
Security Analysis |
1996 • | •• |
| 164867 |
|
Graham B., Dodd D. |
Security Analysis: Principles and Technique, Second Edition |
1934 | •• |
| 192345 |
|
Hawker A. |
Security and Control in Information Systems: A Guide for Business and Accounting |
2000 | •• |
| 211035 |
|
Verhagen H.L.E. |
Security and Credit in Roman Law: The Historical Evolution of Pignus and Hypotheca |
2022 | •• |
| 80456 |
|
Ostrovsky R.(ed.), Prisco R.(ed.), Visconti I.(ed.) |
Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings |
2008 | •• |
| 169630 |
|
De Prisco R., Yung M. |
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings |
2006 | •• |
| 190750 |
|
Ostrovsky R., Prisco R., Visconti I. |
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) |
2008 | •• |
| 169349 |
|
Serpanos D.N., Giladi R. |
Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science) |
2006 | •• |
| 158864 |
|
|
Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security |
n/a | •• |
| 217528 |
|
Raje G. |
Security and Microservice Architecture on AWS: Architecting and Implementing a Secured, Scalable Solution |
2021 | •• |
| 156994 |
|
Henriques M., Khachani M. |
Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy) |
2006 | •• |
| 79209 |
|
Stajano F. (ed.), Meadows C. (ed.), Capkun S. (ed.) |
Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings |
2007 | •• |
| 144243 |
|
Molva R., Tsudik G., Westhoff D. |
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers |
2005 | •• |
| 153377 |
|
Buttyan L., Gligor V., Westhoff D. |
Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected |
2006 | •• |
| 177661 |
|
Jajodia S., Zhou J. |
Security and privacy in communication networks |
2010 | •• |
| 28870 |
|
Feigenbaum J. (Ed) |
Security and Privacy in Digital Rights Management |
2003 | •• |
| 191017 |
|
Sander T. |
Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers |
2002 | •• |
| 135931 |
|
Fischer-Hubner S. |
Security and Privacy in Dynamic Environments |
2006 | •• |
| 135627 |
|
Lian S. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |
| 173985 |
|
Lian S., Schmidt A. |
Security and Privacy in Mobile Information and Communication Systems |
2009 | •• |
| 178299 |
|
Schmidt F., Russello G., Lioy A. |
Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) |
2010 | •• |
| 55586 |
|
Adomi E.E. |
Security and Software for Cybercafes |
2008 | •• |
| 184091 |
|
Delakouridis C., Anagnostopoulos C., Accorsi R. |
Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings |
2013 | •• |
| 24828 |
|
Cranor L.F., Garfinkel S. |
Security and Usability: Designing Secure Systems that People Can Use |
2005 | •• |
| 23162 |
|
Dykstra T., Fuller E., Miles G. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 | •• |
| 76478 |
|
Rogers R., Miles G., Fuller E. |
Security Assessment: Case Studies for Implementing the NSA IAM |
2004 • | •• |
| 217275 |
|
Lunkeit A., Zimmer W. |
Security by Design: Security Engineering informationstechnischer Systeme |
n/a | •• |
| 75533 |
|
Sennewald C. A. |
Security Consulting |
2004 • | •• |
| 13945 |
|
Brewer D.C. |
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access |
2006 | •• |