Books on the topic 'Network security technologies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Network security technologies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.
Find full textBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.
Find full textAmine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.
Find full textHoffman, Daniel. Implementing NAP and NAC Security Technologies. John Wiley & Sons, Ltd., 2008.
Find full textNetwork security, administration, and management: Advancing technologies and practice. Information Science Reference, 2011.
Find full textSecurity, design, and architecture for broadband and wireless network technologies. Information Science Reference, 2013.
Find full textHoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.
Find full textHoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.
Find full textInternational MCETCH Conference on e-Technologies (3rd 2008 Montreal, Que.). 2008 International MCETCH Conference on e-Technologies: 23-25 January, 2008, Montreal, Quebec, Canada : proceedings. IEEE Computer Society, 2007.
Find full textWho might be lurking at your cyber front door? Is your system really secure?: Strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. U.S. G.P.O., 2004.
Find full textSinn, Richard. Software security technologies: A programmatic approach. Thomson/Course Technology, 2008.
Find full textNATO Advanced Networking Workshop on Advanced Security Technologies in Networking (2000 Portoroz, Slovenia). Advanced security technologies in networking. IOS Press, 2001.
Find full textAdvanced security and privacy for RFID technologies. Information Science Reference, 2013.
Find full textPrivacy, intrusion detection, and response: Technologies for protecting networks. Information Science Reference, 2012.
Find full textTim, Kramer, ed. Seven deadliest wireless technologies attacks. Syngress/Elsevier, 2010.
Find full textDisruptive security technologies with mobile code and peer-to-peer networks. CRC Press, 2005.
Find full textCondon, Thomas A. Technologies for facilities management. BOMI International, 2008.
Find full textSharman, Raj, Manish Gupta, and John Walp. Strategic and practical approaches for information security governance: Technologies and applied solutions. Information Science Reference, 2012.
Find full textNemati, Hamid R. Optimizing information security and advancing privacy assurance: New technologies. Information Science Reference, 2012.
Find full text1977-, Dingledine Roger, ed. Privacy enhancing technologies: Third international workshop, PET 2003, Dresden, Germany, March 26-28, 2003 : revised papers. Springer-Verlag, 2003.
Find full textMark, Vandenwauver, ed. Practical intranet security: Overview of the state of the art and available technologies. Kluwer Academic Publishers, 1999.
Find full textInformation assurance and security technologies for risk assessment and threat management: Advances. Information Science Reference, 2012.
Find full textJ, Mattord Herbert, ed. Principles of information security. 2nd ed. Thomson Course Technology, 2005.
Find full textInternational Workshop on Design Issues in Anonymity and Unobservability (2000 Berkeley, Calif.). Designing privacy enhancing technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings. Springer, 2001.
Find full textDigital identity and access management: Technologies and frameworks. Information Science Reference, 2012.
Find full textRusskevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.
Full textCanada. Government Services Canada. Information Management Service. and Canada. Industrial and Corporate Security Branch., eds. Microcomputer and LAN security. Govt. Services Canada, 1993.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. SACMAT 2005: Proceedings of Tenth ACM Symposium on Access Control Models and Technologies : June 1-3, 2005, Stockholm, Sweden. ACM Press, 2005.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control and ACM Digital Library, eds. SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies : Stresa, Italy, June 3-5, 2009. ACM Press, 2009.
Find full textACM Symposium on Access Control Models and Technologies (12th 2007 Sophia Antipolis, France). SACMAT '07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies : Sophia Antipolis, France, June 20-22, 2007. ACM Press, 2007.
Find full textACM Symposium on Access Control Models and Technologies (15th 2010 Pittsburgh, Pa.). SACMAT '10: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA. ACM Press, 2010.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control, ed. SACMAT '10: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA. ACM Press, 2010.
Find full textACM Symposium on Access Control Models and Technologies (11th 2006 Lake Tahoe, CA). SACMAT 2006: Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies : June 7-9, 2006, Lake Tahoe, California, USA. ACM Press, 2006.
Find full textACM, Symposium on Access Control Models and Technologies (12th 2007 Sophia Antipolis France). SACMAT '07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies : Sophia Antipolis, France, June 20-22, 2007. ACM Press, 2007.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. Proceedings of Eighth ACM Symposium on Access Control Models and Technologies: SACMAT 2003 : June 2-3, 2003, Villa Gallia, Como, Italy. ACM Press, 2003.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. Proceedings of Ninth ACM Symposium on Access Control Models and Technologies: SACMAT 2004 : June 2-4, 2004, Yorktown Heights, New York, USA. ACM Press, 2004.
Find full textACM Symposium on Access Control Models and Technologies (13th 2008 Estes Park, Colo.). SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.
Find full textACM Symposium on Access Control Models and Technologies (13th 2008 Estes Park, Colo.). SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.
Find full textMasao, Togawa, and Denshi Jōhō Tsūshin Gakkai (Japan), eds. Netto shakai to honnin ninshō: Genri kara ōyō made = Personal authentication : principles, technologies and applications. Denshi Jōhō Tsūshin Gakkai, 2010.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. Proceedings of Seventh ACM Symposium on Access Control Models and Technologies: SACMAT 2002 : June 3-4, 2002, Naval Postgraduate School, Monterey, California, USA. ACM Press, 2002.
Find full textACM Symposium on Access Control Models and Technologies (6th 2001 Chantilly, Va.). Proceedings of Sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001: Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA. Association for Computing Machinery, 2001.
Find full text1943-, Dillon Tharam S., and Hussain Farookh K, eds. Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidence. John Wiley & Sons Inc., 2006.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Draft legislative proposal on cybersecurity: Hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, December 6, 2011. U.S. G.P.O., 2012.
Find full textPETS 2010 (2010 Berlin, Germany). Privacy enhancing technologies: 10th international symposium, PETS 2010, Berlin, Germany, July 21-23, 2010 : proceedings. Springer, 2010.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Cloud computing: What are the security implications? : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, October 6, 2011. U.S. Government Printing Office, 2012.
Find full textSmart policies for workplace technologies: Email, blogs, cell phones & more. 4th ed. Nolo, 2015.
Find full textRichard, Stim, ed. Smart policies for workplace technologies: Email, blogs, cell phones & more. 3rd ed. Nolo, 2013.
Find full textSociety for Human Resource Management (U.S.), ed. Smart policies for workplace technologies: Email, blogs, cell phones & more. 2nd ed. Nolo, 2011.
Find full text