by
Foresti, Sara. editor.
Format:
Electronic Resources
Excerpt:
and key management; secure hardware systems; attacks to software and network systems; and access
by
Camp, L. Jean. author.
Format:
Electronic Resources
Excerpt:
identity requires exposing information. Together, these points illustrate that the near-term search for
View Other Search Results
by
Axelrod, Warren.
Format:
Electronic Resources
Excerpt:
Information and Proposals-Costs -- Requests for Information/Proposal-Benefits -- Refining the Statement of
by
Blyth, Andrew. author.
Format:
Electronic Resources
Excerpt:
Information -- The Theory of Risks -- The Information World of Crime -- IA Trust and Supply Chains -- Basic IA
by
Vacca, John R. author.
Format:
Electronic Resources
Excerpt:
-- Management of Wireless Network Security -- Ongoing Maintenance -- Standards Development -- Ensuring Site
by
Safavi-Naini, Reihaneh. editor.
Format:
Electronic Resources
Excerpt:
The First International Conference on Digital Rights Management: Technology, Issues, Challenges and
by
Fischer-Hübner, Simone. editor.
Format:
Electronic Resources
Excerpt:
: Security and Risk Management -- Information Security Risk Assessment Model for Risk Management -- On the
by
Katsikas, Sokratis. editor.
Format:
Electronic Resources
Excerpt:
and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information
by
Yang, Laurence T. editor.
Format:
Electronic Resources
Excerpt:
Trust Management in Autonomic and Coordination Applications -- Bayesian Network Based Trust Management
by
Murhammer, Martin W.
Format:
Electronic Resources
Excerpt:
sources-scientific, commercial, qualified journalistic or other-to gather a foundation of information on the subject
by
Lopez, Javier.
Format:
Electronic Resources
Excerpt:
Security Management -- 3.5 Information Security Management Standardization and International Business
Limit Search Results
Narrowed by: