Search Results - "Computer accessibility"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Computer security

    Published 1986
    Subjects: “…Computers Access control…”
  2. 2

    Computers under attack intruders, worms, and viruses by Denning, Peter J. 1942-

    Published 1990
    Subjects:
  3. 3

    Access control, security, and trust a logical approach by Chin, Shiu-Kai, Older, Susan Beth

    Published 2011
    Subjects: “…Computers Access control…”
  4. 4

    Remote access essentials by Robbins, Margaret

    Published 1996
    Subjects: “…Computers Access control…”
  5. 5

    Cryptology unlocked by Wobst, Reinhard, Shafir, Angelika

    Published 2007
    Subjects: “…Computers Access control…”
    Table of contents only
  6. 6

    Access control and identity management by Chapple, Mike

    Published 2021
    Subjects: “…Computers Access control…”
  7. 7

    Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings by Jonker, Willem 1962-, Petkovic, Milan

    Published 2007
    Subjects: “…Computers Access control Congresses…”
  8. 8

    Computer security handbook strategies and techniques for preventing data loss or theft by Maulton, Rolf T.

    Published 1986
    Subjects: “…Computers Access control…”
  9. 9

    Computer security by Galley, Shari Mendelson

    Published 1987
    Subjects: “…Computers Access control…”
  10. 10

    Modern cryptography theory and practice by Mao, Wenbo

    Published 2004
    Subjects: “…Computers Access control…”
  11. 11

    Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers by Biryukov, Alex

    Published 2007
    Subjects: “…Computers Access control Congresses…”
  12. 12
  13. 13

    Security information and event management (SIEM) implementation by Miller, David 1959 November 5-

    Published 2011
    Subjects:
    McGraw Hill
  14. 14
  15. 15

    Internet and Intranet security by Oppliger, Rolf

    Published 2002
    Subjects: “…Computers Access control…”
  16. 16

    Handbook of eID security : concepts, practical experiences, technologies by Fumy, Walter, Paeschke, Manfred

    Published 2011
    Subjects:
  17. 17

    Designing an IAM framework with Oracle identity and access management suite by Scheidel, Jeff

    Published 2010
    Subjects:
    McGraw Hill
  18. 18

    New directions of modern cryptography by Cao, Zhenfu

    Published 2013
    Subjects: