Information security--the next decade : proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95
This books presents a tate-of-the-art review of current perspectives on information security. It contains the selected proceedings of the Eleventh International Information Federation for Information Processing and held in Cape Town, South Africa, May 1995. Information Security examines the informat...
Saved in:
| Corporate Authors: | IFIP TC11 International Conference on Information Security ( Cape Town, South Africa), International Federation for Information Processing |
|---|---|
| Other Authors: | Eloff, Jan H. P., Von Solms, Sebastiaan H. |
| Format: | Conference Proceeding Book |
| Language: | English |
| Published: |
London
Chapman & Hall on behalf of the IFIP
1995
|
| Edition: | 1st ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Logics and languages for reliability and security
Published: (2010)
Published: (2010)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Meeting security challenges through data analytics and decision support
Published: (2016)
Published: (2016)
Database security, IX status and prospects : proceedings of the Ninth Annual IFIP TC11 Working Conference on Database Security, August 1995
Published: (1996)
Published: (1996)
Striving for peace, security, and development of the world annals of Pugwash 1991
Published: (1993)
Published: (1993)
Human systems integration to enhance maritime domain awareness for port / harbour security
Published: (2010)
Published: (2010)
Transportation security against terrorism
Published: (2009)
Published: (2009)
Critical infrastructure protection against hybrid warfare security related challenges
Published: (2016)
Published: (2016)
Database security, volume X status and prospects : IFIP TC11/WG 11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy
Published: (1997)
Published: (1997)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Published: (2009)
Published: (2009)
A future arms control agenda proceedings of nobel symposium 118, 1999
by: lh
by: lh
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Global security a vision for the future : addressing the challenges and opportunities for research in the information age
Published: (2011)
Published: (2011)
Global security a vision for the future : addressing the challenges and opportunities for research in the information age
Published: (2011)
Published: (2011)
Proceedings of LIMA International Maritime Conference 2005 enhancing security in the Straits of Malacca : amalgamation of solutions to keep the Straits open to all : Awana Porto Malai, Langkawi, Malaysia, 4-5 December 2005
Published: (2007)
Published: (2007)
Networks, security and soft computing trends and future directions
Published: (2007)
Published: (2007)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
Web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the web
Published: (2010)
Published: (2010)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Network security assessment know your network
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
AAA identity management security
by: Santuka, Vivek
Published: (2011)
by: Santuka, Vivek
Published: (2011)
International seminar on nuclear war and planetary emergencies 44th session : the role of science in the third millenium : E. Majorana Centre for Scientific Culture, Erice, Italy, 19-24 August 2011
Published: (2016)
Published: (2016)
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
Nontraditional roles of the military and security in East Asia proceeding of NIDS 50th anniversary international symposium on security affairs
Published: (2003)
Published: (2003)
Managing information security
Published: (2014)
Published: (2014)
Data science for cyber-security
Published: (2019)
Published: (2019)
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
Client - side attacks and defense
by: Shimonski, Robert
Published: (2012)
by: Shimonski, Robert
Published: (2012)
Control engineering and information systems
Published: (2015)
Published: (2015)
Kali Linux cookbook effective penetration testing solutions
by: Schultz, Corey P., et al.
Published: (2017)
by: Schultz, Corey P., et al.
Published: (2017)
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen
by: Cobb lhStephen
The Browser Hacker's Handbook
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
Putrajaya Forum 2016 report regional cooperation in adressing security challenges 18-19 April 2016
Published: (2010)
Published: (2010)
Putrajaya Forum 2010 report emerging regional security architecture, 13-15 October 2010, Putrajaya, Malaysia
Published: (2010)
Published: (2010)
Globalization in the 21st century how interconnected is the world?
Published: (2008)
Published: (2008)
Theoretical and technical perspectives on security sector governance from the Adriatic to the Caspian Sea
Published: (2011)
Published: (2011)
Similar Items
-
Data analysis for network cyber-security
Published: (2014) -
Logics and languages for reliability and security
Published: (2010) -
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989) -
Meeting security challenges through data analytics and decision support
Published: (2016) -
Database security, IX status and prospects : proceedings of the Ninth Annual IFIP TC11 Working Conference on Database Security, August 1995
Published: (1996)


