98701. |
Macaulay T. |
Securing Converged IP Networks: New Requirements for ICT Security and Assurance | 2006 |
 |
98702. |
|
Securing data on the Web | 2001 |
 |
98703. |
Lukszo Z. Deconinck G. Weijnen M. |
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality) | 2010 |
 |
98704. |
Piccard P.L. |
Securing IM and P2P Applications for the Enterprise | 2005 |
 |
98705. |
Furnell S. Katsikas S. Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) | 2008 |
 |
98706. |
Furnell S. Katsikas S. Lopez J. |
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) | 2008 |
 |
98707. |
Brotzman L. (Ed) Ranch D. (Ed) |
Securing Linux Step by Step | 1999 |
 |
98708. |
Koconis D. Murray J. |
Securing Linux: A Survival Guide for Linux Security | 2003 |
 |
98709. |
Krutz R.L. |
Securing SCADA Systems | 2005 |
 |
98710. |
Kizza F.M. |
Securing the Information Infrastructure | 2007 |
 |
98711. |
Kizza J. Kizza F. |
Securing the Information Infrastructure | 2008 |
 |
98712. |
Ness L. |
Securing Utility and Energy Infrastructures | 2006 |
 |
98713. |
Thermos P. Takanen A. |
Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures | 2007 |
 |
98714. |
Rosenberg J. Remy D. |
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption | 2004 |
 |
98715. |
Shawgo J. |
Securing Windows 2000 Step-by-Step, Vol. 5 | 2001 |
 |
98716. |
Danseglio M. |
Securing Windows Server 2003 | 2004 |
 |
98717. |
Liu R. Trappe W. |
Securing Wireless Communications at the Physical Layer | 2009 |
 |
98718. |
Held J. |
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User | 2003 |
 |
98719. |
Abelar G. |
Securing Your Business with Cisco ASA and PIX Firewalls | 2005 |
 |
98720. |
Miller D.R. Gregg M. |
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills | 2007 |
 |
98721. |
Graham B. Dodd D. |
Security Analysis (1 edition) | 1996 |
 |
98722. |
Graham B. Dodd D. |
Security Analysis: Principles and Technique, Second Edition | 1934 |
 |
98723. |
Hawker A. |
Security and Control in Information Systems: A Guide for Business and Accounting | 2000 |
 |
98724. |
Verhagen H.L.E. |
Security and Credit in Roman Law: The Historical Evolution of Pignus and Hypotheca | 2022 |
 |
98725. |
Ostrovsky R.(ed.) Prisco R.(ed.) Visconti I.(ed.) |
Security and Cryptography for Networks 6th International Conference, SCN 2008 Amalfi, Italy, September 10-12, 2008 Proceedings | 2008 |
 |
98726. |
De Prisco R. Yung M. |
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings | 2006 |
 |
98727. |
Ostrovsky R. Prisco R. Visconti I. |
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings (Lecture Notes in Computer Science) | 2008 |
 |
98728. |
Serpanos D.N. Giladi R. |
Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science) | 2006 |
 |
98729. |
|
Security and HackingHave You Locked the Castle Gate. Home and Small Business Computer Security | n/a |
 |
98730. |
Raje G. |
Security and Microservice Architecture on AWS: Architecting and Implementing a Secured, Scalable Solution | 2021 |
 |
98731. |
Henriques M. Khachani M. |
Security And Migrations in the Mediterranean: Playing With Fire (NATO Science Series: Science & Technology Policy) (Nato Science Series: Science & Technology Policy) | 2006 |
 |
98732. |
Stajano F. (ed.) Meadows C. (ed.) Capkun S. (ed.) |
Security and Privacy in Ad-hoc and Sensor Networks. 4th European Workshop, ESAS 2007 Cambridge, UK, July 2-3, 2007 Proceedings | 2007 |
 |
98733. |
Molva R. Tsudik G. Westhoff D. |
Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers | 2005 |
 |
98734. |
Buttyan L. Gligor V. Westhoff D. |
Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected | 2006 |
 |
98735. |
Jajodia S. Zhou J. |
Security and privacy in communication networks | 2010 |
 |
98736. |
Feigenbaum J. (Ed) |
Security and Privacy in Digital Rights Management | 2003 |
 |
98737. |
Sander T. |
Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers | 2002 |
 |
98738. |
Fischer-Hubner S. |
Security and Privacy in Dynamic Environments | 2006 |
 |
98739. |
Lian S. |
Security and Privacy in Mobile Information and Communication Systems | 2009 |
 |
98740. |
Lian S. Schmidt A. |
Security and Privacy in Mobile Information and Communication Systems | 2009 |
 |
98741. |
Schmidt F. Russello G. Lioy A. |
Security and Privacy in Mobile Information and Communication Systems (LNICST, 47) | 2010 |
 |
98742. |
Adomi E.E. |
Security and Software for Cybercafes | 2008 |
 |
98743. |
Delakouridis C. Anagnostopoulos C. Accorsi R. |
Security and Trust Management: 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings | 2013 |
 |
98744. |
Cranor L.F. Garfinkel S. |
Security and Usability: Designing Secure Systems that People Can Use | 2005 |
 |
98745. |
Dykstra T. Fuller E. Miles G. |
Security Assessment: Case Studies for Implementing the NSA IAM | 2004 |
 |
98746. |
Rogers R. Miles G. Fuller E. |
Security Assessment: Case Studies for Implementing the NSA IAM (1st edition) | 2004 |
 |
98747. |
Lunkeit A. Zimmer W. |
Security by Design: Security Engineering informationstechnischer Systeme | n/a |
 |
98748. |
Sennewald C. A. |
Security Consulting (Third edition) | 2004 |
 |
98749. |
Brewer D.C. |
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access | 2006 |
 |
98750. |
Herrmann D. |
Security Engineering and Information Assurance | 2002 |
 |
98751. |
Chen J. Miyaji A. Cuzzocrea A. |
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings | 2013 |
 |
98752. |
Schumacher M. |
Security Engineering with Patterns. Origins, Theoretical Model, and New Applications (Lecture Notes in Computer Science) | 2003 |
 |
98753. |
Robinson E. Bond M.J. |
Security for Microsoft Visual Basic .NET | 2003 |
 |
98754. |
Rountree D. |
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts | 2010 |
 |
98755. |
Aissi S. Dabbous N. Prasad A. |
Security for Mobile Networks and Platforms | 2006 |
 |
98756. |
Bertino E. Martino L.M. Paci F. |
Security for web services and service-oriented architectures | 2010 |
 |
98757. |
Anjum F. Mouchtaris P. |
Security for Wireless Ad-hoc Networks | 2007 |
 |
98758. |
V. Hassler |
Security Fundamentals for E-Commerce (Artech House Computer Security Series) | 2002 |
 |
98759. |
Cimato S. Galdi C. Persiano G. |
Security in Communication Networks | 2003 |
 |
98760. |
Blundo C. Cimato S. |
Security in Communication Networks, 4 conf., SCN 2004 (1 edition) | 2005 |
 |
98761. |
Pfleeger C.P. Pfleeger S.L. |
Security in Computing (4th edition) | 2006 |
 |
98762. |
Pfleeger C.P. Pfleeger S.L. |
Security in Computing (3rd edition) | 2002 |
 |
98763. |
Fan C. Thampi S. Atrey P. |
Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings | 2013 |
 |
98764. |
Xiao Y. |
Security in Distributed, Grid, Mobile, and Pervasive Computing | 2007 |
 |
98765. |
Weippl E.R. |
Security in e-learning | 2005 |
 |
98766. |
Dieter Hutter Stephan W. |
Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers | 2004 |
 |
98767. |
Hutter D. Ullmann M. |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings | 2005 |
 |
98768. |
Clark I. Paige R. Polack F. |
Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings | 2006 |
 |
98769. |
Yang Xiao |
Security in Sensor Networks | 2007 |
 |
98770. |
Hardjono Th. Dondeti L.R. |
Security in Wireless LANs and MANs | 2005 |
 |
98771. |
Gal C.S. Kantor P.B. |
Security Informatics and Terrorism | 2007 |
 |
98772. |
Miller D. Harris S. Harper A. |
Security Information and Event Management (SIEM) Implementation (Network Pro Library) | 2011 |
 |
98773. |
Miller D. Harris S. Harper A. |
Security Information and Event Management Implementation | 2010 |
 |
98774. |
Butler C. Fuller E. Rogers J.A. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job | 2007 |
 |
98775. |
Butler Ch. Rogers R. Hurley Ch. |
Security Interviews Exposed: Secrets to Landing Your Next Information Security Job | 2007 |
 |
98776. |
Babbin J. Carter E.F. |
Security Log Management: Identifying Patterns in the Chaos | 2006 |
 |
98777. |
Duffie D. |
Security Markets. Stochastic Models | 1988 |
 |
98778. |
Gerald L. Kovacich Edward Halibozek |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program (1 edition) | 2005 |
 |
98779. |
Kovacich G. Halibozek E. |
Security Metrics Management: How to Manage the Costs of an Assets Protection Program | 2006 |
 |
98780. |
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt | 2007 |
 |
98781. |
Jaquith A. |
Security Metrics: Replacing Fear, Uncertainty, and Doubt (Symantec Press Series) | 2007 |
 |
98782. |
Tsai J. Ma L. |
Security Modeling And Analysis of Mobile Agent Systems | 2006 |
 |
98783. |
Tsai J. Ma L. |
Security Modeling And Analysis of Mobile Agent Systems | 2006 |
 |
98784. |
Tsai J. Ma L. |
Security Modeling and Analysis of Mobile Agent Systems (Electrical and Computer Engineering) | 2006 |
 |
98785. |
Halleen G. Kellogg G. |
Security Monitoring with Cisco Security MARS | 2007 |
 |
98786. |
M. Obaidat N.Boudriga |
Security of e-Systems and Computer Networks | 2007 |
 |
98787. |
Hetland J. Gochitashvili T. |
Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry) | 2004 |
 |
98788. |
Cabrera E. Vela A. |
Security of Water Supply Systems | 2006 |
 |
98789. |
Poweski B. Raphael D. |
Security on Rails | 2009 |
 |
98790. |
Poweski B. Raphael D. |
Security on Rails (The Pragmatic Programmers) | 2009 |
 |
98791. |
Schumacher M. Fernandez-Buglioni E. Hybertson D. |
Security Patterns Integrating Security and Systems Engineering | 2006 |
 |
98792. |
Maiwald E. Sieglein W. |
Security Planning and Disaster Recovery | 2002 |
 |
98793. |
Bryan B. Killion D. Lynn M. |
Security Power Tools | 2007 |
 |
98794. |
Rannenberg K. (ed.) Varadharajan V. (ed.) Weber C. (ed.) |
Security Privacy - Silver Linings in the Cloud | 2010 |
 |
98795. |
Christianson B. Crispo B. Malcolm J. |
Security Protocols | 2010 |
 |
98796. |
Christianson B.(ed.) Crispo B.(ed.) Malcolm J.A.(ed.) |
Security Protocols 10th International Workshop Cambridge, UK, April 17-19, 2002 Revised Papers (1 edition) | 2004 |
 |
98797. |
Christianson B.(ed.) Crispo B.(ed.) Malcom J.A.(ed.) |
Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers | 2007 |
 |
98798. |
Bruce Christianson B.(ed.) Bruno Crispo B.(ed.) Malcolm J.A.(ed.) |
Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings (1 edition) | 2000 |
 |
98799. |
Christianson B. Crispo B. |
Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers | 2005 |
 |
98800. |
Lomas M. |
Security Protocols: International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings | 1997 |
 |