29673 |
|
Miller D.R., Gregg M. |
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills |
2007 | •• |
13287 |
|
Abelar G. |
Securing Your Business with Cisco ASA and PIX Firewalls |
2005 | •• |
24022 |
|
Held J. |
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User |
2003 | •• |
152503 |
|
Liu R., Trappe W. |
Securing Wireless Communications at the Physical Layer |
2009 | •• |
19457 |
|
Danseglio M. |
Securing Windows Server 2003 |
2004 | •• |
26602 |
|
Shawgo J. |
Securing Windows 2000 Step-by-Step, Vol. 5 |
2001 | •• |
22962 |
|
Rosenberg J., Remy D. |
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption |
2004 | •• |
29589 |
|
Thermos P., Takanen A. |
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures |
2007 | •• |
58051 |
|
Ness L. |
Securing Utility and Energy Infrastructures |
2006 | •• |
55304 |
|
Kizza F.M. |
Securing the Information Infrastructure |
2007 | •• |
166109 |
|
Kizza J., Kizza F. |
Securing the Information Infrastructure |
2008 | •• |
12484 |
|
Krutz R.L. |
Securing SCADA Systems |
2005 | •• |
24827 |
|
Koconis D., Murray J. |
Securing Linux: A Survival Guide for Linux Security |
2003 | •• |
27172 |
|
Brotzman L. (Ed), Ranch D. (Ed) |
Securing Linux Step by Step |
1999 | •• |
152846 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
176725 |
|
Furnell S., Katsikas S., Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) |
2008 | •• |
76131 |
|
Piccard P.L. |
Securing IM and P2P Applications for the Enterprise |
2005 | •• |
142565 |
|
Lukszo Z., Deconinck G., Weijnen M. |
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) |
2010 | •• |
10181 |
|
|
Securing data on the Web |
2001 | •• |
29588 |
|
Macaulay T. |
Securing Converged IP Networks: New Requirements for ICT Security and Assurance |
2006 | •• |
14041 |
|
|
Securing Cisco IOS Networks |
2004 | •• |
26918 |
|
Mourani G. |
Securing and Optimizing Red Hat Linux |
2000 | •• |
27173 |
|
Mourani G. |
Securing and Optimizing Linux: A Hands on Guide for Linux Professionals, Redhat Edition |
2000 | •• |
28370 |
|
Davis P.T. |
Securing and controlling Cisco routers |
2002 | •• |
30084 |
|
Wells Ch. |
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web |
2007 | •• |
158158 |
|
Information Security |
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security) |
2008 | •• |
21475 |
|
Seagren E., Noonan W.J. (ed.) |
Secure Your Network for Free |
2007 | •• |
20791 |
|
Eastlake D.E., Niles K. |
Secure XML: The New Syntax for Signatures and Encryption |
2002 | •• |
169524 |
|
Chen Q., Zhang C., Zhang S. |
Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science / Programming and Software Engineering) |
2008 | •• |
77976 |
|
Chen Q. |
Secure Transaction Protocol Analysis: Models and Applications |
2008 | •• |
29587 |
|
Jurjens J. |
Secure Systems Development with UML |
2004 | •• |
26497 |
|
Goransson P., Greenlaw R. |
Secure Roaming in 802.11 Networks |
2007 | •• |
26382 |
|
Chess B., West J., McGraw G. |
Secure Programming with Static Analysis |
2007 | •• |
152881 |
|
Wheeler D. |
Secure programming with Linux and Unix HOWTO |
2003 | •• |
112164 |
|
Wheeler D.A. |
Secure Programming for Linux and Unix HOWTO |
2003 | •• |
13930 |
|
Messier M., Viega J. |
Secure Programming Cookbook for C and C++ |
2003 | •• |
26967 |
|
Galic M. |
Secure Portal: Using Websphere Portal V5 and Tivoli Access Manager V4.1 |
2003 | •• |
23484 |
|
Kabir M.J. |
Secure PHP Development: Building 50 Practical Applications |
2003 | •• |
149554 |
|
Baumgart R. |
Secure Networking - CQRE (Secure) '99: International Exhibition and Congress D?sseldorf, Germany, November 30 - December 2, 1999, Proceedings |
1999 | •• |
193251 |
|
Onieva J., Zhou J. |
Secure Multi-Party Non-Repudiation Protocols and Applications |
2009 • | •• |
160462 |
|
Burmester M., Yasinsac A. |
Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers |
2006 | •• |
23350 |
|
Robichaux R. |
Secure Messaging with Microsoft Exchange Server 2003 |
2004 | •• |
30083 |
|
Robichaux P. |
Secure Messaging with Microsoft Exchange Server 2000 |
2003 • | •• |
127566 |
|
Poovendran R., Wang C., Roy S. |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks |
2007 | •• |
133763 |
|
Choo R. |
Secure Key Establishment |
2008 | •• |
139560 |
|
Choo K. |
Secure Key Establishment |
2009 | •• |
188726 |
|
Nielson H., Gollmann D. |
Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings |
2013 | •• |
186348 |
|
Taha S., Shen X. |
Secure IP Mobility Management for VANET |
2013 | •• |
180341 |
|
Vitek J., Jensen C. |
Secure Internet Programming |
1999 | •• |
187252 |
|
Ogiela M., Ogiela U. |
Secure Information Management Using Linguistic Threshold Approach |
2014 | •• |