Handbook of eID security : concepts, practical experiences, technologies
| Main Authors: | Fumy, Walter (Author), Paeschke, Manfred (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Erlangen :
Publicis ,
c2011
|
| Subjects: |
Similar Items
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Computer security
Published: (1986)
Published: (1986)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)
by: Wong, Caroline
Published: (2012)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Designing an IAM framework with Oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
A machine learning approach to phishing detection and defense
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
Internet and Intranet security
by: Oppliger, Rolf
Published: (2002)
by: Oppliger, Rolf
Published: (2002)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos
by: Mohd Asyraf Muizzuddin Yunos
The library security and safety guide to prevention, planning, and response
by: Kahn, Miriam (Miriam B.)
Published: (2008)
by: Kahn, Miriam (Miriam B.)
Published: (2008)
Access 2000 through examples
by: Sellappan, P.
Published: (1999)
by: Sellappan, P.
Published: (1999)
Database design, development and deployment using Microsoft Access
by: Rob, Peter, et al.
Published: (2000)
by: Rob, Peter, et al.
Published: (2000)
Access 97 power programming
by: Barker, F. Scott
Published: (1997)
by: Barker, F. Scott
Published: (1997)
Access 2007 bible
by: Groh, Michael R. 1951-
Published: (2007)
by: Groh, Michael R. 1951-
Published: (2007)
Creating Access applications
by: Dunn, Melissa W.
Published: (1994)
by: Dunn, Melissa W.
Published: (1994)
Industrial network security securing critical infrastructure networks for smart grid, scada, and other industrial control systems
by: Knapp, Eric D., et al.
Published: (2015)
by: Knapp, Eric D., et al.
Published: (2015)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Microsoft access 2007 data analysis
by: Alexander, Michael 1972-
Published: (2007)
by: Alexander, Michael 1972-
Published: (2007)
Applied Oracle security developing secure database and middleware environments
by: Knox, David (David C.)
Published: (2010)
by: Knox, David (David C.)
Published: (2010)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2014)
by: Andress, Jason
Published: (2014)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Internet governance and censorship
by: Fuentes, Osbaldo, et al.
Published: (2014)
by: Fuentes, Osbaldo, et al.
Published: (2014)
Go! with Microsoft Office Access 2003 comprehensive
by: Foster-Turpen, Linda, et al.
Published: (2004)
by: Foster-Turpen, Linda, et al.
Published: (2004)
Smart Bike Sharing System for Institute of Higher Learning Using Time-Based One-Time Password Algorithm
by: Husna Humaira Abu Backer Sidek
by: Husna Humaira Abu Backer Sidek
Principles of information security
by: Whitman, Michael E., et al.
Published: (2003)
by: Whitman, Michael E., et al.
Published: (2003)
High-level subject access tools and techniques in Internet cataloging
by: Ahronheim, Judith R.
Published: (2002)
by: Ahronheim, Judith R.
Published: (2002)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Cyber security culture counteracting cyber threats through organizational learning and training
by: Trim, Peter R. J., et al.
Published: (2013)
by: Trim, Peter R. J., et al.
Published: (2013)
Securing E-Business applications and communications
by: Held, Jonathan S., et al.
Published: (2001)
by: Held, Jonathan S., et al.
Published: (2001)
Similar Items
-
Personal computer security
by: Tiley, W. Edward
Published: (1996) -
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007) -
Computer security
Published: (1986) -
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007) -
Security metrics a beginner's guide
by: Wong, Caroline
Published: (2012)