To see the other types of publications on this topic, follow the link: Network security technologies.

Books on the topic 'Network security technologies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Network security technologies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hoffman, Daniel. Implementing NAP and NAC Security Technologies. John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Network security, administration, and management: Advancing technologies and practice. Information Science Reference, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Security, design, and architecture for broadband and wireless network technologies. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International MCETCH Conference on e-Technologies (3rd 2008 Montreal, Que.). 2008 International MCETCH Conference on e-Technologies: 23-25 January, 2008, Montreal, Quebec, Canada : proceedings. IEEE Computer Society, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Who might be lurking at your cyber front door? Is your system really secure?: Strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sinn, Richard. Software security technologies: A programmatic approach. Thomson/Course Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 Portoroz, Slovenia). Advanced security technologies in networking. IOS Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Advanced security and privacy for RFID technologies. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Privacy, intrusion detection, and response: Technologies for protecting networks. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tim, Kramer, ed. Seven deadliest wireless technologies attacks. Syngress/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Disruptive security technologies with mobile code and peer-to-peer networks. CRC Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Condon, Thomas A. Technologies for facilities management. BOMI International, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sharman, Raj, Manish Gupta, and John Walp. Strategic and practical approaches for information security governance: Technologies and applied solutions. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Nemati, Hamid R. Optimizing information security and advancing privacy assurance: New technologies. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

1977-, Dingledine Roger, ed. Privacy enhancing technologies: Third international workshop, PET 2003, Dresden, Germany, March 26-28, 2003 : revised papers. Springer-Verlag, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mark, Vandenwauver, ed. Practical intranet security: Overview of the state of the art and available technologies. Kluwer Academic Publishers, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Information assurance and security technologies for risk assessment and threat management: Advances. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

J, Mattord Herbert, ed. Principles of information security. 2nd ed. Thomson Course Technology, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

International Workshop on Design Issues in Anonymity and Unobservability (2000 Berkeley, Calif.). Designing privacy enhancing technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings. Springer, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Digital identity and access management: Technologies and frameworks. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Russkevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.

Full text
Abstract:
The publication is devoted to the investigation of the criminal law aspects of countering crimes committed through the use of modern information and communication technologies (computers, information and communication networks, including the Internet). We analyze the current legislation, the theoretical development and practice in cases of information crimes. The manual complies with federal state educational standards of higher professional education in the field of "Law Enforcement", "Legal provision of national security" and "Jurisprudence".
APA, Harvard, Vancouver, ISO, and other styles
27

Canada. Government Services Canada. Information Management Service. and Canada. Industrial and Corporate Security Branch., eds. Microcomputer and LAN security. Govt. Services Canada, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. SACMAT 2005: Proceedings of Tenth ACM Symposium on Access Control Models and Technologies : June 1-3, 2005, Stockholm, Sweden. ACM Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control and ACM Digital Library, eds. SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies : Stresa, Italy, June 3-5, 2009. ACM Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

ACM Symposium on Access Control Models and Technologies (12th 2007 Sophia Antipolis, France). SACMAT '07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies : Sophia Antipolis, France, June 20-22, 2007. ACM Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

ACM Symposium on Access Control Models and Technologies (15th 2010 Pittsburgh, Pa.). SACMAT '10: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA. ACM Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control, ed. SACMAT '10: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA. ACM Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

ACM Symposium on Access Control Models and Technologies (11th 2006 Lake Tahoe, CA). SACMAT 2006: Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies : June 7-9, 2006, Lake Tahoe, California, USA. ACM Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

ACM, Symposium on Access Control Models and Technologies (12th 2007 Sophia Antipolis France). SACMAT '07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies : Sophia Antipolis, France, June 20-22, 2007. ACM Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. Proceedings of Eighth ACM Symposium on Access Control Models and Technologies: SACMAT 2003 : June 2-3, 2003, Villa Gallia, Como, Italy. ACM Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. Proceedings of Ninth ACM Symposium on Access Control Models and Technologies: SACMAT 2004 : June 2-4, 2004, Yorktown Heights, New York, USA. ACM Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

ACM Symposium on Access Control Models and Technologies (13th 2008 Estes Park, Colo.). SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

ACM Symposium on Access Control Models and Technologies (13th 2008 Estes Park, Colo.). SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Masao, Togawa, and Denshi Jōhō Tsūshin Gakkai (Japan), eds. Netto shakai to honnin ninshō: Genri kara ōyō made = Personal authentication : principles, technologies and applications. Denshi Jōhō Tsūshin Gakkai, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. Proceedings of Seventh ACM Symposium on Access Control Models and Technologies: SACMAT 2002 : June 3-4, 2002, Naval Postgraduate School, Monterey, California, USA. ACM Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

ACM Symposium on Access Control Models and Technologies (6th 2001 Chantilly, Va.). Proceedings of Sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001: Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA. Association for Computing Machinery, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

1943-, Dillon Tharam S., and Hussain Farookh K, eds. Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidence. John Wiley & Sons Inc., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Draft legislative proposal on cybersecurity: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, December 6, 2011. U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

PETS 2010 (2010 Berlin, Germany). Privacy enhancing technologies: 10th international symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Cloud computing: What are the security implications? : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, October 6, 2011. U.S. Government Printing Office, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Smart policies for workplace technologies: Email, blogs, cell phones & more. 4th ed. Nolo, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Richard, Stim, ed. Smart policies for workplace technologies: Email, blogs, cell phones & more. 3rd ed. Nolo, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Society for Human Resource Management (U.S.), ed. Smart policies for workplace technologies: Email, blogs, cell phones & more. 2nd ed. Nolo, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Network Security Technologies. 2nd ed. AUERBACH, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!