Explore: Computers Access Control
Discover books, insights, and more — all in one place.
Learn more about Computers Access Control with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computers--access-control”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Network Security Assessment
By Chris McNab

“Network Security Assessment” Metadata:
- Title: Network Security Assessment
- Author: Chris McNab
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 478
- Publisher: ➤ O'Reilly Media, Inc. - O'Reilly Media, Incorporated - Anaya Multimedia - O'Reilly - O'Reilly Media
- Publish Date: ➤ 2004 - 2005 - 2007 - 2008 - 2016
- Publish Location: ➤ Sebastopol, CA - Cambridge - Sebastopol - Beijing
“Network Security Assessment” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Evaluation - Security measures - Computer networks, security measures - Computers, access control - Database security - Data protection - Computer security - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL23691203M - OL22133719M - OL36716419M - OL3327684M - OL36706371M - OL23399927M - OL13267854M - OL23635962M - OL36707449M - OL9513003M - OL23556906M - OL36716538M - OL26836814M
- Online Computer Library Center (OCLC) ID: 180989270 - 57059486
- Library of Congress Control Number (LCCN): 2009419532 - 2004302106
- All ISBNs: ➤ 9780596519339 - 0596510306 - 9781306816878 - 149191095X - 9780596510305 - 059600611X - 9788441517516 - 8441517517 - 0596519338 - 1306816874 - 1306817455 - 9781491910955 - 9780596520809 - 0596520808 - 9781306817455 - 9780596006112
Author's Alternative Names:
"Christopher Ross McNab" and "Christopher R. McNab"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Network Security Assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2The rise of the computer state
By Burnham, David

“The rise of the computer state” Metadata:
- Title: The rise of the computer state
- Author: Burnham, David
- Language: English
- Number of Pages: Median: 273
- Publisher: Random House - Vintage Books
- Publish Date: 1983 - 1984
- Publish Location: New York
“The rise of the computer state” Subjects and Themes:
- Subjects: ➤ Access control - Computer security - Computers - Privacy, Right of - Right of Privacy - Gesellschaft - Derecho a la intimidad - Control de acceso - Privacy - Computer - Ordenadores - Persönlichkeitsrecht - Bürokratie - Computers, access control
- Places: United States
Edition Identifiers:
- The Open Library ID: OL3505609M - OL3185084M - OL17727829M
- Online Computer Library Center (OCLC) ID: 9280638 - 10146428
- Library of Congress Control Number (LCCN): 82042808 - 83040374
- All ISBNs: 9780394514376 - 0394514378 - 0394723759 - 9780394723754
Access and General Info:
- First Year Published: 1983
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The rise of the computer state at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Kali Linux
By Wolf Halton and Bo Weaver

“Kali Linux” Metadata:
- Title: Kali Linux
- Authors: Wolf HaltonBo Weaver
- Language: English
- Number of Pages: Median: 422
- Publisher: ➤ Packt Publishing - Packt Publishing, Limited
- Publish Date: 2016
“Kali Linux” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL39246778M
- All ISBNs: 1782168494 - 9781782168492
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Kali Linux at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Advanced Computing and Systems for Security
By Rituparna Chaki, Agostino Cortesi, Khalid Saeed and Nabendu Chaki

“Advanced Computing and Systems for Security” Metadata:
- Title: ➤ Advanced Computing and Systems for Security
- Authors: Rituparna ChakiAgostino CortesiKhalid SaeedNabendu Chaki
- Language: English
- Number of Pages: Median: 180
- Publisher: ➤ Springer Singapore Pte. Limited - Springer
- Publish Date: ➤ 2015 - 2017 - 2018 - 2019 - 2020 - 2021
“Advanced Computing and Systems for Security” Subjects and Themes:
- Subjects: ➤ Computer security - Machine learning - Computational intelligence - Computer science - Computer networks - Computers, access control
Edition Identifiers:
- The Open Library ID: ➤ OL30722632M - OL37432664M - OL30907486M - OL37270340M - OL28187659M - OL33939272M - OL30902106M - OL30613458M - OL28175090M - OL30682205M - OL28220680M - OL28196807M - OL28139694M - OL33939507M - OL37432890M - OL28243423M - OL28035822M - OL28170335M
- All ISBNs: ➤ 9789811034084 - 9811337012 - 9788132226536 - 9811033900 - 9811389632 - 8132226488 - 9789811389689 - 9811034087 - 8132226534 - 9789811557460 - 9789811337017 - 9811389683 - 9788132226505 - 9811389616 - 9811557489 - 9789811332494 - 9811081794 - 9811332495 - 8132226518 - 9789811642869 - 9789811557484 - 9788132226482 - 9789811529290 - 9789811389634 - 9789811081798 - 9811642931 - 9811081824 - 813222650X - 9811529299 - 9788132226512 - 9789811081828 - 9811642869 - 9811557462 - 9789811033902 - 9789811389610 - 9789811642937
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advanced Computing and Systems for Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5The net delusion
By Evgeny Morozov, E. Morozov and Eduardo G. Murillo

“The net delusion” Metadata:
- Title: The net delusion
- Authors: Evgeny MorozovE. MorozovEduardo G. Murillo
- Languages: rus - English
- Number of Pages: Median: 432
- Publisher: ➤ Ediciones Destino - Allen Lane : Penguin Books - АСТ - PENGUIN UK - PublicAffairs - Public Affairs - Penguin Books, Limited - Penguin Press/Classics
- Publish Date: 2011 - 2012 - 2014
- Publish Location: New York - Москва, Россия
“The net delusion” Subjects and Themes:
- Subjects: ➤ Political aspects - Censorship - Access control - Internet - Freedom of information - Computers - Internet, political aspects - Information society - New York Times reviewed - Computers, access control - Aspect politique - Censure - Liberté d'information - Société numérique - Media Studies - Informationsfreiheit - Zensur - Propaganda - Privatsphäre - Datenschutz - Zugriffskontrolle - Politik - Politiska aspekter - Censur - Informationsfrihet - Informationssamhället - Demokratisering - Internet--political aspects - Internet--censorship - Computers--access control - Hm851 .m665 2011 - 303.48/33 - Social networking - Civil rights - Fascism & totalitarianism - Professional, career & trade -> computer science -> internet & www - Cs.soc_sci.poli_sci.gen_polit_sc
Edition Identifiers:
- The Open Library ID: ➤ OL51723733M - OL47503415M - OL47503414M - OL28259613M - OL38790658M - OL34830709M - OL34497928M - OL34471632M - OL29078442M - OL27595510M - OL24384759M
- Online Computer Library Center (OCLC) ID: 806162088 - 820727695 - 515438457
- Library of Congress Control Number (LCCN): 2010039066
- All ISBNs: ➤ 9781280588075 - 9780141961828 - 1610391632 - 0141961821 - 1280588071 - 9785170847921 - 9781610391634 - 9781586488741 - 9781846143533 - 1846143535 - 5170847920 - 9780141049571 - 9781586488758 - 1610391063 - 1586488759 - 9781610391061 - 8423327795 - 1586488740 - 014104957X - 9788423327799
Author's Alternative Names:
"Evgeny V. Morozov" and "Евгений Морозов"Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The net delusion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Security in Computing and Communications
By Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat and Jose M. Alcaraz Calero

“Security in Computing and Communications” Metadata:
- Title: ➤ Security in Computing and Communications
- Authors: Sabu M. ThampiSanjay MadriaGuojun WangDanda B. RawatJose M. Alcaraz Calero
- Language: English
- Number of Pages: Median: 460
- Publisher: ➤ Springer - Lloret Mauri Jaime - Springer Singapore Pte. Limited - Springer London, Limited
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2021
“Security in Computing and Communications” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Computers, access control - Computer science - Computer Communication Networks - Data protection - Systems and Data Security - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: ➤ OL36217183M - OL30785909M - OL28961763M - OL28305858M - OL37235873M - OL30321492M - OL28178189M - OL37322457M - OL30195670M - OL30528404M - OL37236356M - OL34541263M - OL28337128M
- All ISBNs: ➤ 366244965X - 3642405762 - 9789811068997 - 9811068992 - 3319229141 - 9783319229140 - 9811548242 - 9789811358258 - 9783319229157 - 9789811027376 - 9789811548260 - 9783642405761 - 3662449668 - 9783662449660 - 9789811548246 - 9811548269 - 9811027390 - 9789811068973 - 9811027374 - 9811068976 - 331922915X - 9789811027390 - 9811604215 - 9783662449653 - 9811358257 - 9789811604218
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in Computing and Communications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Access control, authentication, and public key infrastructure
By Bill Ballad

“Access control, authentication, and public key infrastructure” Metadata:
- Title: ➤ Access control, authentication, and public key infrastructure
- Author: Bill Ballad
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ Jones & Bartlett Learning, LLC - Jones & Bartlett Learning
- Publish Date: 2011 - 2013
- Publish Location: Sudbury, MA
“Access control, authentication, and public key infrastructure” Subjects and Themes:
- Subjects: ➤ Public key cryptography - Computers - Access control - Authentication - Computer security - Computer networks, security measures - Computers, access control - Cryptography
Edition Identifiers:
- The Open Library ID: OL25047332M - OL28512974M - OL29698839M
- Online Computer Library Center (OCLC) ID: 702369403 - 650217951
- Library of Congress Control Number (LCCN): 2011282487 - 2013372266
- All ISBNs: ➤ 1284031594 - 0763791288 - 9781284031591 - 1284031608 - 9781284031607 - 9780763791285
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Access control, authentication, and public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Security protocols
By Bruce Christianson, Bruno Crispo, James A. Malcolm and Michael Roe

“Security protocols” Metadata:
- Title: Security protocols
- Authors: Bruce ChristiansonBruno CrispoJames A. MalcolmMichael Roe
- Language: English
- Number of Pages: Median: 325
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: ➤ 2003 - 2005 - 2006 - 2007 - 2009 - 2013
“Security protocols” Subjects and Themes:
- Subjects: ➤ Cryptographie - Cryptography - Congrès - Contrôle - Congresses - Accès - Computer security - Ordinateurs - Sécurité informatique - Computers, access control - Computers - Access control
Edition Identifiers:
- The Open Library ID: ➤ OL37229026M - OL37140924M - OL35787219M - OL35781654M - OL35776192M - OL35758120M - OL34472497M - OL34472449M - OL34456964M - OL34456818M - OL9057060M
- Online Computer Library Center (OCLC) ID: 506115933
- Library of Congress Control Number (LCCN): 2006932036
- All ISBNs: ➤ 3540398716 - 3540455701 - 3540318364 - 9783540458074 - 3642049044 - 9783540409267 - 3540448101 - 9783642417177 - 354049135X - 3642417175 - 3540458077 - 9783642049040 - 9783540448105 - 3540409254 - 3540771565 - 9783540771562 - 3540409262 - 9783540455707 - 9783540409250 - 9783540318361 - 9783540398714 - 9783540491354
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security protocols at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Penetration tester's open source toolkit
By Jeremy Faircloth

“Penetration tester's open source toolkit” Metadata:
- Title: ➤ Penetration tester's open source toolkit
- Author: Jeremy Faircloth
- Language: English
- Number of Pages: Median: 458
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2006 - 2007 - 2011 - 2016
- Publish Location: Waltham, MA
“Penetration tester's open source toolkit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - Computer networks - Computers - Security measures - Computers, access control - Computer security - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: ➤ OL35770090M - OL35755261M - OL28579982M - OL35770487M - OL24886177M - OL34507910M
- Online Computer Library Center (OCLC) ID: 733546833 - 761694692
- Library of Congress Control Number (LCCN): 2011025807
- All ISBNs: ➤ 9780080556079 - 1597496286 - 1597496278 - 9780080489520 - 0128023538 - 0080489524 - 9780128023532 - 0080556078 - 9780128021491 - 9781597496278 - 9781597496285 - 0128021497
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Penetration tester's open source toolkit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Hacking with Kali
By James Broad and Andrew Bindner

“Hacking with Kali” Metadata:
- Title: Hacking with Kali
- Authors: James BroadAndrew Bindner
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ Elsevier Science & Technology Books
- Publish Date: 2013
“Hacking with Kali” Subjects and Themes:
- Subjects: ➤ Computers, access control - Computer networks, security measures - Computers, study and teaching - Electronic data processing personnel, certification - Penetration testing (Computer security) - Hackers - Kali Linux - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL28505252M - OL35490901M
- Online Computer Library Center (OCLC) ID: 870340083
- Library of Congress Control Number (LCCN): 2013045051
- All ISBNs: 9780124078833 - 9780124077492 - 0124077498 - 0124078834
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking with Kali at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Metasploit Penetration Testing Cookbook
By Abhinav Singh

“Metasploit Penetration Testing Cookbook” Metadata:
- Title: ➤ Metasploit Penetration Testing Cookbook
- Author: Abhinav Singh
- Language: English
- Number of Pages: Median: 426
- Publisher: ➤ de Gruyter GmbH, Walter - Packt - Packt Publishing, Limited
- Publish Date: 2012 - 2018
“Metasploit Penetration Testing Cookbook” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL51793271M - OL39577672M - OL26046835M - OL33646642M
- All ISBNs: ➤ 1849517436 - 178862971X - 9781788629713 - 1788623177 - 9781788623179 - 9781849517430 - 9781849517423 - 1849517428
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Metasploit Penetration Testing Cookbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Access denied
By Ronald Deibert

“Access denied” Metadata:
- Title: Access denied
- Author: Ronald Deibert
- Language: English
- Number of Pages: Median: 472
- Publisher: MIT Press - The MIT Press
- Publish Date: 2008 - 2018
- Publish Location: Cambridge, MA
“Access denied” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Government policy - Censorship - Internet - Censur - Medienfreiheit - Informationspolitik - Filtering (signalen) - 05.39 mass communication and mass media: other - Zensur - Censuur - Overheidsbeleid - 05.38 content aspects of electronic communication - Regierung - Networking - General - Security - Impact of science & technology on society - Regional government policies - Computers, access control - Internet, government policy
Edition Identifiers:
- The Open Library ID: ➤ OL17179788M - OL10238053M - OL29023410M - OL29706852M - OL29754011M - OL10236924M
- Online Computer Library Center (OCLC) ID: 85851590
- Library of Congress Control Number (LCCN): 2007010334
- All ISBNs: ➤ 9780262255998 - 9780262042451 - 0262541963 - 0262255995 - 9780262251440 - 0262290723 - 9780262541961 - 0262042452 - 9780262290722 - 0262251442
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Access denied at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Privacy Technologies and Policy
By Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer and Nikolaos Tsouroulas

“Privacy Technologies and Policy” Metadata:
- Title: ➤ Privacy Technologies and Policy
- Authors: Manel MedinaAndreas MitrakasKai RannenbergErich SchweighoferNikolaos Tsouroulas
- Language: English
- Number of Pages: Median: 221
- Publisher: ➤ Springer - MOXIC - Springer International Publishing AG
- Publish Date: ➤ 2016 - 2017 - 2018 - 2019 - 2021 - 2022 - 2024
“Privacy Technologies and Policy” Subjects and Themes:
- Subjects: Data protection - Privacy, right of - Computers, access control - Computer security - Data encryption (computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL28181480M - OL32697849M - OL53273394M - OL28112930M - OL28258582M - OL51798979M - OL37992811M - OL27945658M
- All ISBNs: ➤ 3030025462 - 9783030766627 - 9783319447599 - 3030217515 - 3031073142 - 9783030025465 - 3319672797 - 9783030217518 - 3030766624 - 3319447599 - 9783031610882 - 3031610881 - 9783319672793 - 9783031073144 - 3031680235 - 9783031680236
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy Technologies and Policy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Information Systems Security and Privacy
By Olivier Camp, Edgar Weippl, Christophe Bidan and Esma Aïmeur

“Information Systems Security and Privacy” Metadata:
- Title: ➤ Information Systems Security and Privacy
- Authors: Olivier CampEdgar WeipplChristophe BidanEsma Aïmeur
- Language: English
- Number of Pages: Median: 308
- Publisher: ➤ Springer London, Limited - Springer International Publishing AG - Springer
- Publish Date: ➤ 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - 2022
“Information Systems Security and Privacy” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Computers, access control - Computer networks, security measures - Data encryption (computer science) - Information technology - Computer software, development - Artificial intelligence
Edition Identifiers:
- The Open Library ID: ➤ OL34545052M - OL37252230M - OL36763715M - OL28191319M - OL28337362M - OL28000496M - OL28236810M
- All ISBNs: ➤ 303025108X - 9783030494421 - 9783030948993 - 3319276670 - 9783319933535 - 9783030251086 - 3319276689 - 3319933531 - 3030948994 - 303049442X - 9783319276670 - 9783319276687 - 9783319544328 - 3319544322
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Systems Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Kali Linux - an Ethical Hacker's Cookbook
By Himanshu Sharma

“Kali Linux - an Ethical Hacker's Cookbook” Metadata:
- Title: ➤ Kali Linux - an Ethical Hacker's Cookbook
- Author: Himanshu Sharma
- Language: English
- Number of Pages: Median: 472
- Publisher: ➤ de Gruyter GmbH, Walter - Packt Publishing, Limited
- Publish Date: 2019
“Kali Linux - an Ethical Hacker's Cookbook” Subjects and Themes:
- Subjects: ➤ Computer security - Computers, access control - Computer networks, security measures - Linux (computer operating system)
Edition Identifiers:
- The Open Library ID: OL33757579M - OL51791658M
- All ISBNs: 9781789952308 - 1789952301 - 1789953707 - 9781789953701
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Kali Linux - an Ethical Hacker's Cookbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Mobile access safety
By Dominique Assing
“Mobile access safety” Metadata:
- Title: Mobile access safety
- Author: Dominique Assing
- Language: English
- Number of Pages: Median: 246
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - ISTE - Wiley
- Publish Date: 2012 - 2013 - 2014
- Publish Location: London, UK - Hoboken, NJ
“Mobile access safety” Subjects and Themes:
- Subjects: ➤ Mobile communication systems - Security measures - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: ➤ OL33433271M - OL31115234M - OL39879629M - OL39885658M - OL33433308M - OL35580554M - OL33464508M
- Online Computer Library Center (OCLC) ID: 812570967
- Library of Congress Control Number (LCCN): 2012951550
- All ISBNs: ➤ 1118577884 - 9781118578056 - 9781848214354 - 9781118577882 - 1119034957 - 1118577817 - 9781119034957 - 1118578058 - 129918667X - 1118577981 - 9781299186675 - 9781118577813 - 9781118577981 - 1848214359
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Mobile access safety at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Access Control, Security, and Trust
By Shiu-Kai Chin and Susan Beth Older

“Access Control, Security, and Trust” Metadata:
- Title: ➤ Access Control, Security, and Trust
- Authors: Shiu-Kai ChinSusan Beth Older
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ CRC Press LLC - Chapman & Hall/CRC - Taylor & Francis Group
- Publish Date: 2009 - 2010 - 2024
“Access Control, Security, and Trust” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computers, access control - Computers - Access control - System design - Ordinateurs - Accès - Contrôle - Conception de systèmes
Edition Identifiers:
- The Open Library ID: ➤ OL57524516M - OL33489125M - OL33742698M - OL33533913M - OL12313848M - OL33412293M
- Online Computer Library Center (OCLC) ID: 1129340144 - 144216832
- Library of Congress Control Number (LCCN): 2010022619
- All ISBNs: ➤ 1032921315 - 0429184433 - 9780429184437 - 9781584888628 - 9781439894637 - 9781439891551 - 1439891559 - 1584888636 - 1584888628 - 9781584888635 - 9781032921310 - 1439894639
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Access Control, Security, and Trust at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Mechanics of user identification and authentication
By Dobromir Todorov

“Mechanics of user identification and authentication” Metadata:
- Title: ➤ Mechanics of user identification and authentication
- Author: Dobromir Todorov
- Language: English
- Number of Pages: Median: 744
- Publisher: ➤ Auerbach Publications - Auerbach Pub - Auerbach Publishers, Incorporated - Taylor and Francis - AUERBACH
- Publish Date: 2007
- Publish Location: London - Boca Raton, FL
“Mechanics of user identification and authentication” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer networks - Security measures - Computers - Access control - Computer security - Computer networks, security measures - Computers, access control - Authentication - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Sécurité informatique - Systèmes d'exploitation (Ordinateurs) - Authentification - COMPUTERS - Internet - Security - Networking - General - Authentifikation - Computersicherheit - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL37980829M - OL37950430M - OL8484655M - OL22757383M - OL24278188M
- Online Computer Library Center (OCLC) ID: 263353270 - 77716961
- Library of Congress Control Number (LCCN): 2007060355
- All ISBNs: ➤ 9780429133138 - 1466546689 - 0429133138 - 9781420052206 - 1420052209 - 9781420052190 - 1420052195 - 9781466546684
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mechanics of user identification and authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19PGP
By Simson Garfinkel

“PGP” Metadata:
- Title: PGP
- Author: Simson Garfinkel
- Language: English
- Number of Pages: Median: 393
- Publisher: ➤ O'Reilly Media, Inc. - O'Reilly & Associates
- Publish Date: 1994 - 1995
- Publish Location: Sebastopol, CA - Beijing
“PGP” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Data encryption (Computer science) - PGP (Computer file) - Computers, access control - Computer security - Cryptography
Edition Identifiers:
- The Open Library ID: OL932511M - OL8667177M - OL13625378M
- Online Computer Library Center (OCLC) ID: 36009214
- Library of Congress Control Number (LCCN): 95233196
- All ISBNs: 1565920988 - 9781565920989
Author's Alternative Names:
"Simson L. Garfinkel"Access and General Info:
- First Year Published: 1994
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find PGP at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Broadband Access
By Steven Scott Gorshe, Dilip Krishnaswamy, Starr, Thomas, Stefano Galli and Arvind Raghavan

“Broadband Access” Metadata:
- Title: Broadband Access
- Authors: Steven Scott GorsheDilip KrishnaswamyStarr, ThomasStefano GalliArvind Raghavan
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2014 - 2015
“Broadband Access” Subjects and Themes:
- Subjects: ➤ Broadband communication systems - Computers, access control - Local area networks (computer networks) - Wireless communication systems - Computer networks - Standards - Internet access
Edition Identifiers:
- The Open Library ID: ➤ OL39920254M - OL29066235M - OL29231150M - OL33648882M - OL33960937M - OL29224250M
- Library of Congress Control Number (LCCN): 2014000602 - 2014010361
- All ISBNs: ➤ 1306533228 - 9781118878798 - 1119104432 - 9780470741801 - 0470741805 - 1118878779 - 9781118878804 - 1118878809 - 9781119104438 - 1118878795 - 9781306533225 - 9781118878774
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Broadband Access at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21OAuth 2 in Action
By Justin Richer and Antonio Sanso

“OAuth 2 in Action” Metadata:
- Title: OAuth 2 in Action
- Authors: Justin RicherAntonio Sanso
- Language: English
- Number of Pages: Median: 360
- Publisher: ➤ Manning Publications - Manning Publications Co. LLC
- Publish Date: 2017
“OAuth 2 in Action” Subjects and Themes:
- Subjects: Computers, access control - Computer network protocols
Edition Identifiers:
- The Open Library ID: OL26836346M - OL34133940M
- All ISBNs: 9781617293276 - 9781638352280 - 1638352283 - 161729327X
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find OAuth 2 in Action at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Integrating a Usable Security Protocol into User Authentication Services Design Process
By Ahmed Seffah, Christina Braz and Syed Naqvi
“Integrating a Usable Security Protocol into User Authentication Services Design Process” Metadata:
- Title: ➤ Integrating a Usable Security Protocol into User Authentication Services Design Process
- Authors: Ahmed SeffahChristina BrazSyed Naqvi
- Language: English
- Publisher: ➤ Taylor & Francis Group - Auerbach Publishers, Incorporated
- Publish Date: 2018 - 2020
“Integrating a Usable Security Protocol into User Authentication Services Design Process” Subjects and Themes:
- Subjects: ➤ Computers, access control - Computer networks, security measures - Identification - Computer security - Computers - Access control - Computer networks - Security measures - Computer Security - Ordinateurs - Accès - Contrôle - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - COMPUTERS - Programming - Software Development - Security - General - MATHEMATICS
Edition Identifiers:
- The Open Library ID: ➤ OL34642315M - OL36736177M - OL37969347M - OL36740510M - OL37975167M - OL34682502M
- Online Computer Library Center (OCLC) ID: 1066176910
- All ISBNs: ➤ 1138577685 - 9780429435270 - 9780429787492 - 9780367656928 - 9780429787485 - 0429787502 - 9781138577688 - 0429787499 - 0367656922 - 9780429787508 - 0429787480 - 0429435274
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Integrating a Usable Security Protocol into User Authentication Services Design Process at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Cisco ISE for BYOD and Secure Unified Access
By Jamey Heary

“Cisco ISE for BYOD and Secure Unified Access” Metadata:
- Title: ➤ Cisco ISE for BYOD and Secure Unified Access
- Author: Jamey Heary
- Language: English
- Number of Pages: Median: 832
- Publisher: ➤ Cisco Press - Pearson Education, Limited
- Publish Date: 2013 - 2017
“Cisco ISE for BYOD and Secure Unified Access” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computers, access control - Computer networks - Security measures - Computers - Access control - Computer networks -- Security measures - Computers -- Access control - Identification - Computer network protocols
Edition Identifiers:
- The Open Library ID: ➤ OL28128561M - OL28239404M - OL34758303M - OL35566813M - OL34787464M - OL35566946M
- Online Computer Library Center (OCLC) ID: 854752398
- Library of Congress Control Number (LCCN): 2013938450
- All ISBNs: ➤ 0133103633 - 9780134586694 - 1587144735 - 0134586670 - 1587143259 - 0133103625 - 9780134586670 - 0134586697 - 9780133103625 - 9781587143250 - 9781587144738 - 9780133103632
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco ISE for BYOD and Secure Unified Access at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Kerberos
The Definitive Guide
By Jason Garman

“Kerberos” Metadata:
- Title: Kerberos
- Author: Jason Garman
- Language: English
- Number of Pages: Median: 262
- Publisher: ➤ O'Reilly Media, Incorporated - O'Reilly Media, Inc. - O'Reilly - O'Reilly Media
- Publish Date: 2003
- Publish Location: Farnham - Beijing
“Kerberos” Subjects and Themes:
- Subjects: Access control - Computer networks - Security measures - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL7581015M - OL36795948M - OL3320673M - OL36708556M
- Online Computer Library Center (OCLC) ID: 52785065
- Library of Congress Control Number (LCCN): 2004272744
- All ISBNs: ➤ 9781449391423 - 9781449390778 - 1449390773 - 1449391427 - 0596004036 - 9780596004033
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Kerberos at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Engineering Secure Software and Systems
By Jan Jürjens

“Engineering Secure Software and Systems” Metadata:
- Title: ➤ Engineering Secure Software and Systems
- Author: Jan Jürjens
- Language: English
- Number of Pages: Median: 244
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2013 - 2014
- Publish Location: Berlin, Heidelberg
“Engineering Secure Software and Systems” Subjects and Themes:
- Subjects: ➤ Models and Principles - Software Engineering/Programming and Operating Systems - Cryptology and Information Theory Data Structures - Software engineering - Data structures (Computer science) - Math Applications in Computer Science - Computer Communication Networks - Data Encryption - Computer science - Data encryption (Computer science) - Computer security - Congresses - Computer networks - Security measures - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL37180274M - OL28305681M - OL28093176M - OL27996989M - OL27036423M
- Library of Congress Control Number (LCCN): 2013930843
- All ISBNs: ➤ 3642365647 - 3642365620 - 3642365639 - 9783642365645 - 9783642365638 - 3319048961 - 331904897X - 9783319048970 - 9783642365621 - 9783319048963
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Engineering Secure Software and Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Rootkits for dummies
By Larry Stevenson

“Rootkits for dummies” Metadata:
- Title: Rootkits for dummies
- Author: Larry Stevenson
- Language: English
- Number of Pages: Median: 380
- Publisher: ➤ Wiley Pub. - John Wiley & Sons, Ltd.
- Publish Date: 2007
- Publish Location: New York - Indianapolis, Ind
“Rootkits for dummies” Subjects and Themes:
- Subjects: ➤ Computers - Computer security - Access control - Computer Technology - Nonfiction - Rootkits (Computer software) - Microsoft windows (computer program) - Computers, access control
Edition Identifiers:
- The Open Library ID: OL24072004M - OL23934007M - OL24277125M
- Online Computer Library Center (OCLC) ID: 191680812 - 219607397
- Library of Congress Control Number (LCCN): 2006926390
- All ISBNs: 9780471917106 - 0470101830 - 0471917109 - 9780470101834
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Rootkits for dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Information security architecture
By Jan Killmeyer Tudor

“Information security architecture” Metadata:
- Title: ➤ Information security architecture
- Author: Jan Killmeyer Tudor
- Language: English
- Number of Pages: Median: 381
- Publisher: ➤ Auerbach Publications - Brand: Auerbach Publications - Taylor & Francis Group - Auerbach
- Publish Date: 2000 - 2001 - 2006 - 2010
- Publish Location: Boca Raton, FL
“Information security architecture” Subjects and Themes:
- Subjects: Computer architecture - Computer security - Computersicherheit - Computers, access control - Information science
Edition Identifiers:
- The Open Library ID: OL33454557M - OL33448761M - OL6785992M - OL22570481M - OL22344354M
- Library of Congress Control Number (LCCN): 00040399 - 2006273982
- All ISBNs: ➤ 0849399882 - 1280536942 - 9781280536946 - 9780849315497 - 0849315492 - 9780849399886 - 1280651202 - 9781280651205
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security architecture at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28802.1X port-based authentication
By Edwin Lyle Brown

“802.1X port-based authentication” Metadata:
- Title: ➤ 802.1X port-based authentication
- Author: Edwin Lyle Brown
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ Auerbach Publishers, Incorporated - Taylor & Francis Group - Auerbach - AUERBACH - Taylor and Francis
- Publish Date: 2006 - 2007 - 2010 - 2019
- Publish Location: Boca Raton - London
“802.1X port-based authentication” Subjects and Themes:
- Subjects: ➤ Access control - Computer Technology - Computer network protocols - Computer networks - Computers - Nonfiction - Security measures - Standards - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: ➤ OL37980012M - OL34648967M - OL33441787M - OL8484597M - OL17866258M - OL24248788M
- Online Computer Library Center (OCLC) ID: 71427240
- Library of Congress Control Number (LCCN): 2006030999
- All ISBNs: ➤ 0429117302 - 9781420044645 - 9781281075819 - 9781420044652 - 1281075817 - 9780367389673 - 0367389673 - 1420044656 - 1420044648 - 9780429117305
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find 802.1X port-based authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Understanding and applying cryptography and data security
By Adam J. Elbirt

“Understanding and applying cryptography and data security” Metadata:
- Title: ➤ Understanding and applying cryptography and data security
- Author: Adam J. Elbirt
- Language: English
- Number of Pages: Median: 637
- Publisher: ➤ Auerbach Publishers, Incorporated - AUERBACH - Auerbach Publications - Taylor & Francis Group - CRC Press
- Publish Date: 2008 - 2009 - 2019
- Publish Location: Boca Raton, Fl
“Understanding and applying cryptography and data security” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Data protection - Computers, access control - Computer Security - Sécurité informatique - Cryptographie
Edition Identifiers:
- The Open Library ID: OL37952051M - OL19890289M - OL34655457M - OL11816817M
- Online Computer Library Center (OCLC) ID: 229047602 - 648411300
- Library of Congress Control Number (LCCN): 2008028154
- All ISBNs: ➤ 9781420061611 - 9780367385798 - 9781420061604 - 1420061607 - 0367385791 - 1420061615
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Understanding and applying cryptography and data security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Identity Management for Internet of Things
By Parikshit N. Mahalle and Poonam N. Railkar

“Identity Management for Internet of Things” Metadata:
- Title: ➤ Identity Management for Internet of Things
- Authors: Parikshit N. MahallePoonam N. Railkar
- Language: English
- Number of Pages: Median: 175
- Publisher: River Publishers
- Publish Date: 2015 - 2022
“Identity Management for Internet of Things” Subjects and Themes:
- Subjects: ➤ Ubiquitous computing - Computers, access control - Internet of things - Security measures - Computers - Access control - Internet des objets - Informatique omniprésente - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - SCIENCE / Energy - TECHNOLOGY / Telecommunications
Edition Identifiers:
- The Open Library ID: OL40143673M - OL40133742M - OL44274315M - OL40143798M - OL28581952M
- Online Computer Library Center (OCLC) ID: 957125082
- Library of Congress Control Number (LCCN): 2015429434
- All ISBNs: ➤ 1000795403 - 9788793102903 - 9781000792713 - 9788793102910 - 100333850X - 8793102917 - 9781000795400 - 1000792714 - 8793102909 - 9781003338505
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Identity Management for Internet of Things at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Official (ISC)2 Guide to the CISSP CBK Reference
By John Warsinske, Mark G. Graff, Kevin Henry, Christopher Hoover and Ben Malisow
“Official (ISC)2 Guide to the CISSP CBK Reference” Metadata:
- Title: ➤ Official (ISC)2 Guide to the CISSP CBK Reference
- Authors: John WarsinskeMark G. GraffKevin HenryChristopher HooverBen Malisow
- Language: English
- Number of Pages: Median: 928
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2019
“Official (ISC)2 Guide to the CISSP CBK Reference” Subjects and Themes:
- Subjects: ➤ Computers, access control - Administrative agencies - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL39941768M - OL29437106M - OL29437104M
- All ISBNs: ➤ 9781119423300 - 1119423325 - 1119423309 - 9781119423317 - 1119423317 - 9781119423324
Author's Alternative Names:
"Mark Graff"Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Official (ISC)2 Guide to the CISSP CBK Reference at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Research in Attacks, Intrusions and Defenses
By Angelos Stavrou, Herbert Bos and Georgios Portokalidis

“Research in Attacks, Intrusions and Defenses” Metadata:
- Title: ➤ Research in Attacks, Intrusions and Defenses
- Authors: Angelos StavrouHerbert BosGeorgios Portokalidis
- Language: English
- Number of Pages: Median: 578
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2013 - 2014 - 2015
“Research in Attacks, Intrusions and Defenses” Subjects and Themes:
- Subjects: ➤ Computer security - Computers, access control - Computer science - Computer Communication Networks - Data protection - Information Systems - Systems and Data Security - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL37229053M - OL37250826M - OL37229228M - OL28118873M - OL28109762M
- All ISBNs: ➤ 9783319263625 - 364241284X - 9783642412844 - 9783319113791 - 3319263617 - 9783319263618 - 331911378X - 9783319113784 - 3319263625 - 3319113798
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Research in Attacks, Intrusions and Defenses at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Rootkit arsenal
By Bill Blunden

“Rootkit arsenal” Metadata:
- Title: Rootkit arsenal
- Author: Bill Blunden
- Language: English
- Number of Pages: Median: 784
- Publisher: Jones & Bartlett Learning
- Publish Date: 2012
- Publish Location: Burlington, Mass
“Rootkit arsenal” Subjects and Themes:
- Subjects: ➤ Rootkits (Computer software) - Computer viruses - Computer hackers - Computers - Access control - Computers, access control - Hackers
Edition Identifiers:
- The Open Library ID: OL25121731M
- Online Computer Library Center (OCLC) ID: 808125878
- Library of Congress Control Number (LCCN): 2011045666
- All ISBNs: 9781449626365 - 144962636X
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Rootkit arsenal at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Practical intrusion detection handbook
By Paul E. Proctor

“Practical intrusion detection handbook” Metadata:
- Title: ➤ Practical intrusion detection handbook
- Author: Paul E. Proctor
- Language: English
- Number of Pages: Median: 359
- Publisher: Prentice Hall PTR
- Publish Date: 2001
- Publish Location: Upper Saddle River, N.J
“Practical intrusion detection handbook” Subjects and Themes:
- Subjects: Access control - Computer security - Computers - Handbooks, manuals - Computers, access control
Edition Identifiers:
- The Open Library ID: OL6901760M
- Online Computer Library Center (OCLC) ID: 44736910
- Library of Congress Control Number (LCCN): 00712769
- All ISBNs: 0130259608 - 9780130259608
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Practical intrusion detection handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Implementing 802.1X Security Solutions for Wired and Wireless Networks
By Jim Geier

“Implementing 802.1X Security Solutions for Wired and Wireless Networks” Metadata:
- Title: ➤ Implementing 802.1X Security Solutions for Wired and Wireless Networks
- Author: Jim Geier
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley - John Wiley & Sons, Ltd.
- Publish Date: 2008 - 2009
- Publish Location: New York
“Implementing 802.1X Security Solutions for Wired and Wireless Networks” Subjects and Themes:
- Subjects: ➤ Computer Technology - Engineering - Nonfiction - Computer file - Wireless LANs - IEEE 802.16 (Standard) - IEEE 802.11 (Standard) - Computer networks - Microsoft Windows (Computer file) - Security measures - Microsoft Windows - Computer network protocols - Computers, access control - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL39882400M - OL29170991M - OL24247320M - OL10294218M
- Online Computer Library Center (OCLC) ID: 254393126 - 173499029
- Library of Congress Control Number (LCCN): 2012392957
- All ISBNs: ➤ 9780470168608 - 0470370289 - 1281381845 - 9781281381842 - 9780470370285 - 0470370866 - 0470168609 - 9780470370865
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Implementing 802.1X Security Solutions for Wired and Wireless Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Modern Cryptography
By Wenbo Mao

“Modern Cryptography” Metadata:
- Title: Modern Cryptography
- Author: Wenbo Mao
- Language: English
- Number of Pages: Median: 740
- Publisher: ➤ Prentice Hall PTR - Pearson Higher Education & Professional Group
- Publish Date: 2003 - 2004 - 2011
- Publish Location: Upper Saddle River, NJ
“Modern Cryptography” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Cryptography - Data transmission systems - Security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL28474755M - OL7332908M - OL9287558M - OL17841036M - OL17630504M
- Online Computer Library Center (OCLC) ID: 52825512
- All ISBNs: 9780130669438 - 9780132887410 - 013288741X - 0130669431
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Modern Cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Practical intrusion analysis
prevention and detection for the twenty-first century
By Ryan Trost

“Practical intrusion analysis” Metadata:
- Title: Practical intrusion analysis
- Author: Ryan Trost
- Language: English
- Publisher: ➤ Pearson Education, Limited - Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2009
- Publish Location: ➤ [United States?] - Upper Saddle River, NJ
“Practical intrusion analysis” Subjects and Themes:
- Subjects: ➤ Computer networks - Monitoring - Computer security - Access control - Computers - Security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL45175846M - OL35568074M - OL35471573M - OL23229915M
- Online Computer Library Center (OCLC) ID: 317877904
- Library of Congress Control Number (LCCN): 2009019158
- All ISBNs: ➤ 9780321591890 - 9780321591807 - 0321591801 - 0321591887 - 9780321591913 - 0321591895 - 9780321591883 - 0321591917
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Practical intrusion analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Multivariate public key cryptosystems
By Jintai Ding, Jason E. Gower and Dieter Schmidt

“Multivariate public key cryptosystems” Metadata:
- Title: ➤ Multivariate public key cryptosystems
- Authors: Jintai DingJason E. GowerDieter Schmidt
- Language: English
- Number of Pages: Median: 260
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2006 - 2008 - 2010 - 2020
“Multivariate public key cryptosystems” Subjects and Themes:
- Subjects: ➤ Computers - Data encryption (Computer science) - Computer security - Access control - Cryptography - Information theory - Computers, access control - Quantum theory - Computer science - Data structures (Computer science) - Coding theory - Cryptology and Information Theory Data Structures - Data Encryption - Coding and Information Theory - Data Structures - Mathematics of Computing - Theory of Computation
Edition Identifiers:
- The Open Library ID: OL35750675M - OL34371060M - OL29511683M - OL28240116M - OL7445386M
- Online Computer Library Center (OCLC) ID: 65764987
- Library of Congress Control Number (LCCN): 2006285715
- All ISBNs: ➤ 1071609858 - 9780387322292 - 0387369465 - 1441940774 - 9780387512167 - 9781441940773 - 0387322299 - 0387512160 - 9780387369464 - 9781071609859
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Multivariate public key cryptosystems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Practical Deployment of Cisco Identity Services Engine
By Andy Richter and Jeremy Wood

“Practical Deployment of Cisco Identity Services Engine” Metadata:
- Title: ➤ Practical Deployment of Cisco Identity Services Engine
- Authors: Andy RichterJeremy Wood
- Language: English
- Number of Pages: Median: 298
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2015
“Practical Deployment of Cisco Identity Services Engine” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computers, access control - Computer networks - Security measures - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL28591461M - OL35810720M
- Online Computer Library Center (OCLC) ID: 924626396
- All ISBNs: 9780128044575 - 0128044578 - 9780128045046 - 0128045043
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Practical Deployment of Cisco Identity Services Engine at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Multilevel Modeling of Secure Systems in QoP-ML
By Bogdan Ksiezopolski
“Multilevel Modeling of Secure Systems in QoP-ML” Metadata:
- Title: ➤ Multilevel Modeling of Secure Systems in QoP-ML
- Author: Bogdan Ksiezopolski
- Language: English
- Number of Pages: Median: 262
- Publisher: ➤ Auerbach Publishers, Incorporated
- Publish Date: 2015
“Multilevel Modeling of Secure Systems in QoP-ML” Subjects and Themes:
- Subjects: ➤ Computer security - Computers, access control - Computer networks, security measures - Risk assessment
Edition Identifiers:
- The Open Library ID: OL34720891M - OL37981655M - OL34516799M - OL37980019M
- All ISBNs: ➤ 9781482202564 - 135123174X - 1351230611 - 0429167644 - 9781351230612 - 1482202565 - 9780429167645 - 9781351231749
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Multilevel Modeling of Secure Systems in QoP-ML at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Kali Linux Intrusion and Exploitation Cookbook
By Ishan Girdhar and Dhruv Shah

“Kali Linux Intrusion and Exploitation Cookbook” Metadata:
- Title: ➤ Kali Linux Intrusion and Exploitation Cookbook
- Authors: Ishan GirdharDhruv Shah
- Language: English
- Number of Pages: Median: 576
- Publisher: ➤ de Gruyter GmbH, Walter - Packt Publishing
- Publish Date: 2017
“Kali Linux Intrusion and Exploitation Cookbook” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL26836403M - OL51794812M
- All ISBNs: 1783982179 - 9781783982165 - 1783982160 - 9781783982172
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Kali Linux Intrusion and Exploitation Cookbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42The state of the art in intrusion prevention and detection
By Al-Sakib Khan Pathan

“The state of the art in intrusion prevention and detection” Metadata:
- Title: ➤ The state of the art in intrusion prevention and detection
- Author: Al-Sakib Khan Pathan
- Language: English
- Number of Pages: Median: 494
- Publisher: ➤ CRC Press/Taylor & Francis Group - Taylor & Francis Group - Auerbach Publishers, Incorporated
- Publish Date: 2014 - 2016
- Publish Location: Boca Raton, [Florida]
“The state of the art in intrusion prevention and detection” Subjects and Themes:
- Subjects: ➤ Computer security - Computers - Access control - Computer networks - Security measures - COMPUTERS / Networking / General - COMPUTERS / Security / General - Computers, access control - Computer networks, security measures - Sécurité informatique - Ordinateurs - Accès - Contrôle - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Networking - General - Security
Edition Identifiers:
- The Open Library ID: OL34643004M - OL37959721M - OL31159335M - OL33549765M
- Online Computer Library Center (OCLC) ID: 870716537 - 855779251
- Library of Congress Control Number (LCCN): 2013030986
- All ISBNs: ➤ 9781138033986 - 1482203529 - 1306410339 - 9781482203523 - 9781306410335 - 1482203510 - 9781482203516 - 1138033987
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The state of the art in intrusion prevention and detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Critical Information Infrastructures Security
By Javier Lopez

“Critical Information Infrastructures Security” Metadata:
- Title: ➤ Critical Information Infrastructures Security
- Author: Javier Lopez
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2007 - 2013
“Critical Information Infrastructures Security” Subjects and Themes:
- Subjects: ➤ Computer security - Congresses - Computers - Access control - Computers, access control - Computers, congresses - Computer science - Computer networks, security measures - Data encryption (computer science) - Computer Communication Networks - Data protection - Systems and Data Security - Computers and Society
Edition Identifiers:
- The Open Library ID: OL34452486M - OL27960177M - OL30476133M - OL12810196M
- Online Computer Library Center (OCLC) ID: 77482493
- Library of Congress Control Number (LCCN): 2006938669
- All ISBNs: ➤ 3540690832 - 3642414842 - 9783540690832 - 9783540690849 - 3642414869 - 9783642414862 - 9783642414848 - 3540690840
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Critical Information Infrastructures Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Technology and Practice of Passwords
By Frank Stajano, Stig F. Mjølsnes, Graeme Jenkinson and Per Thorsheim

“Technology and Practice of Passwords” Metadata:
- Title: ➤ Technology and Practice of Passwords
- Authors: Frank StajanoStig F. MjølsnesGraeme JenkinsonPer Thorsheim
- Language: English
- Number of Pages: Median: 159
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2015 - 2016
“Technology and Practice of Passwords” Subjects and Themes:
- Subjects: Computers, access control
Edition Identifiers:
- The Open Library ID: OL27963894M - OL34526808M - OL28686756M - OL34531172M
- All ISBNs: ➤ 3319241923 - 9783319241913 - 3319299379 - 3319241915 - 9783319299389 - 9783319299372 - 3319299387 - 9783319241920
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Technology and Practice of Passwords at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Integrated Security Systems Design
By Thomas L. Norman

“Integrated Security Systems Design” Metadata:
- Title: ➤ Integrated Security Systems Design
- Author: Thomas L. Norman
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ Elsevier Science & Technology - Elsevier Science & Technology Books - Butterworth-Heinemann
- Publish Date: 2011 - 2014 - 2018
“Integrated Security Systems Design” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Information storage and retrieval systems - Computers, access control - Computer networks - Security measures - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL35756318M - OL28548918M - OL33474514M - OL27940113M
- Online Computer Library Center (OCLC) ID: 893919825
- All ISBNs: ➤ 0128102373 - 9780128000229 - 0080471447 - 0128000228 - 9780128102374 - 9780128001936 - 9780080471440 - 0128001933
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Integrated Security Systems Design at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Electronic Access Control
By Thomas L. Norman
“Electronic Access Control” Metadata:
- Title: Electronic Access Control
- Author: Thomas L. Norman
- Language: English
- Number of Pages: Median: 512
- Publisher: ➤ Elsevier Science & Technology Books
- Publish Date: 2011 - 2017
“Electronic Access Control” Subjects and Themes:
- Subjects: ➤ Electronic apparatus and appliances - Computers, access control - Security systems - Electronic security systems - Electronic locking devices
Edition Identifiers:
- The Open Library ID: OL29102494M - OL28637240M - OL28472178M - OL34544989M
- Online Computer Library Center (OCLC) ID: 826866928
- Library of Congress Control Number (LCCN): 2012359540
- All ISBNs: ➤ 9780123820280 - 0123820294 - 0123820286 - 9780128093405 - 0128093404 - 9780123820297 - 9780128054659 - 0128054654
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Electronic Access Control at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Critical Information Infrastructures Security
By Erich Rome, Marianthi Theocharidou and Stephen Wolthusen

“Critical Information Infrastructures Security” Metadata:
- Title: ➤ Critical Information Infrastructures Security
- Authors: Erich RomeMarianthi TheocharidouStephen Wolthusen
- Language: English
- Number of Pages: Median: 279
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2010 - 2016 - 2017
“Critical Information Infrastructures Security” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL34534573M - OL37140464M - OL30100193M - OL28269855M
- All ISBNs: ➤ 9783642143793 - 3319333305 - 9783319713670 - 9783319333304 - 3319333313 - 3319713671 - 9783319333311 - 3642143792
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Critical Information Infrastructures Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Network Scanning Cookbook: Practical network security using Nmap and Nessus 7
By Sairam Jetty

“Network Scanning Cookbook: Practical network security using Nmap and Nessus 7” Metadata:
- Title: ➤ Network Scanning Cookbook: Practical network security using Nmap and Nessus 7
- Author: Sairam Jetty
- Number of Pages: Median: 304
- Publisher: Packt Publishing
- Publish Date: 2018
“Network Scanning Cookbook: Practical network security using Nmap and Nessus 7” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: OL26832937M
- All ISBNs: 9781789346480 - 1789346487
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Network Scanning Cookbook: Practical network security using Nmap and Nessus 7 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Handbook of eID security
By Walter Fumy and Manfred Paeschke

“Handbook of eID security” Metadata:
- Title: Handbook of eID security
- Authors: Walter FumyManfred Paeschke
- Language: English
- Number of Pages: Median: 316
- Publisher: ➤ Jossey-Bass - Publicis - Publicis MCD Werbeagentur GmbH
- Publish Date: 2010 - 2011
- Publish Location: Erlangen
“Handbook of eID security” Subjects and Themes:
- Subjects: ➤ Computers - Access control - Phishing - Database security - Identity theft - Electronic information resources - Computer security - Prevention - Computers, access control
Edition Identifiers:
- The Open Library ID: OL25170894M - OL29061470M
- Online Computer Library Center (OCLC) ID: 690089999
- Library of Congress Control Number (LCCN): 2011294208
- All ISBNs: 3895786586 - 389578379X - 9783895783791 - 9783895786587
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Handbook of eID security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Access controlled
By Ronald Deibert

“Access controlled” Metadata:
- Title: Access controlled
- Author: Ronald Deibert
- Language: English
- Number of Pages: Median: 634
- Publisher: MIT Press - The MIT Press
- Publish Date: 2010
- Publish Location: Cambridge, Mass
“Access controlled” Subjects and Themes:
- Subjects: ➤ Cyberspace - Government policy - Censorship - Access control - Internet - Computers - Ethical issues: censorship - Legal aspects of IT - Internet: general works - Computers, access control - Internet, government policy
Edition Identifiers:
- The Open Library ID: OL29754835M - OL29707196M - OL29707036M - OL23962649M
- Online Computer Library Center (OCLC) ID: 457159952
- Library of Congress Control Number (LCCN): 2009049632
- All ISBNs: ➤ 0262514354 - 9780262266031 - 9780262014342 - 0262014343 - 9780262290739 - 9780262320443 - 9780262514354 - 0262290731 - 0262266032 - 0262320444
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Access controlled at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.