Books on the topic 'Firewalls (Computer security) Computer networks Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Firewalls (Computer security) Computer networks Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Stewart, James Michael. Network security firewalls & VPNs. Sudbury, MA: Jones & Bartlett Learning, 2010.
Find full textB, Oakes Edward, ed. Firewalls and VPNs: Principles and practices. Upper Saddle River, N.J: Pearson Prentice Hall, 2005.
Find full textVacca, John R. Firewalls clearly explained. 2nd ed. San Francisco, Calif: Morgan Kaufmann, 2000.
Find full textPreetham, V. V. Internet security and firewalls. Cincinnati, Ohio: Premier Press, 2002.
Find full textRonald, Sharp, ed. PCWeek Intranet and Internet firewalls strategies. Emeryville, Calif: Ziff-Davis Press, 1996.
Find full textGonçalves, Marcus, and Marcus Gonçalves. Protecting your Web sites with firewalls. Upper Saddle River, NJ: Prentice Hall, 1997.
Find full textSimon, Cooper, and Chapman D. Brent, eds. Building Internet Firewalls: Internet and Web security. 2nd ed. Beijing: O'Reilly, 2000.
Find full textIntroduction to cryptography and network security. Boston: McGraw-Hill Higher Education, 2008.
Find full textWhitman, Michael E. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Boston, Massachusetts: Cengage Delmar Learning, 2009.
Find full textGreg, Holden, ed. Guide to firewalls and network security with intrusion detection and VPNs. 2nd ed. Boston, Massachusetts: Cengage Delmar Learning, 2009.
Find full textWack, John P. Keeping your site comfortably secure: An introduction to Internet firewalls. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Admintration, National Institute of Standards and Technology, 1994.
Find full textLoad Balancing Servers, Firewalls, and Caches. New York: John Wiley & Sons, Ltd., 2002.
Find full textHelmut, Knebl, ed. Introduction to cryptography: Principles and applications. Berlin: Springer, 2002.
Find full textWilliam, Stallings. Cryptography and network security: Principles and practices. 4th ed. Delhi: Pearson Education, 2006.
Find full textStallings, William. Cryptography and network security: Principles and practice. 5th ed. Boston: Prentice Hall, 2011.
Find full textStallings, William. Cryptography and network security: Principles and practice. 4th ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2006.
Find full textWilliam, Stallings. Practical cryptography for internetworks. Los Alamitos, Calif: IEEE Computer Society Press, 1996.
Find full textFrahim, Jazib. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, IN: Cisco Press, 2010.
Find full textFrahim, Jazib. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, IN: Cisco Press, 2010.
Find full textOmar, Santos, ed. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, Ind: Cisco Press, 2010.
Find full textFrahim, Jazib. Cisco ASA: All-in-one firewall, IPS, Anti-X, and VPN adaptive security appliance. 2nd ed. Indianapolis, IN: Cisco Press, 2010.
Find full textDave, Hucaby, and Cisco Systems Inc, eds. Cisco ASA, PIX, and FWSM firewall handbook. 2nd ed. Indianapolis, Ind: Cisco Press, 2007.
Find full textWilliam, Stallings. Practical cryptography for data internetworks. Los Alamitos, Calif: IEEE Computer Society Press, 1996.
Find full textOnline, Safari Tech Books, ed. Securing your business with CISCO ASA and PIX firewalls. Indianapolis, Ind: Cisco, 2005.
Find full textVũ, Đình Cường. Bảo vệ máy tính bằng tường lửa & phương pháp lướt Web an toàn. Hà Nội: Nhà xuất bản Lao động - xã hội, 2009.
Find full textDisappearing cryptography information hiding: Steganography and watermarking. 3rd ed. Burlington, MA: Morgan Kaufmann Publishers, 2009.
Find full textElçi, Atilla. Theory and practice of cryptography solutions for secure information systems. Hershey, PA: Information Science Reference, 2013.
Find full textRosenberg, Burton. Handbook of financial cryptography and security. Boca Raton: Chapman & Hall/CRC, 2011.
Find full textauthor, Slamanig Daniel, ed. Cryptography for security and privacy in cloud computing. Boston: Artech House, 2014.
Find full textStewart, J. Michael. Network Security, Firewalls and VPNs. Jones & Bartlett Learning, LLC, 2013.
Find full text(Editor), Charles Riley. Cisco PIX Firewalls: Configure, Manage, & Troubleshoot. 2nd ed. Syngress, 2005.
Find full textStallings, William. Cryptography and Network Security. Pearson Education, Limited, 2018.
Find full text