|
Your search for [subject]Computer networks--Security measures returned 79 records. |
|
|
Sort by:
|
|
|
|
|
|
|
|
Internet security for business.
New York: Wiley, 1996.
Subject: Business enterprises -- Computer networks -- Security measures; Internet (Computer network) -- Security measures; World Wide Web -- Security measures; Electronic funds transfers -- Security measures; Data encryption (Computer science).
|
|
|
|
|
|
|
|
|
|
|
|
|
Internet security for business.
New York: Wiley, 1996.
Subject: Business enterprises -- Computer networks -- Security measures; Data encryption (Computer science); Electronic funds transfers -- Security measures; Internet (Computer network) -- Security measures; World Wide Web (Information retrieval system) -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
Mapping security : the corporate security sourcebook for today's global economy.
by Patterson, Tom.; Upper Saddle River, NJ: Addison-Wesley, 2005.
Subject: Electronic commerce -- Security measures; International business enterprises -- Computer networks -- Security measures; Internet -- Security measures; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
Trust and risk in Internet commerce.
by Camp, L. Jean; Cambridge, Mass.: MIT Press, 2000.
Subject: Electronic commerce -- Security measures; Internet (Computer network) -- Security measures; Business enterprises -- Computer networks -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
Bandits on the information superhighway.
by Barrett, Daniel J.; USA: O'Reilly & Associates,Inc, 1996.
Subject: Information and Communication Technology; Computer crimes; Information superhighway; World Wide Web -- Security measures; Internet -- Security measures; Computer networks -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
An improvement on logical key hierarchy algorithm for multicast and group security.
by Ho Hai Van; 2005.
Subject: Multicasting (Computer networks) -- Security measures; Computer networks -- Security measures; Data encryption (Computer Science); Multichannel communication; Broadband communication systems.
|
|
|
|
|
|
|
|
|
|
|
|
|
Internet security made easy : a plain-English guide to protecting yourself and your company online.
by Schweitzer, Douglas.; New York: AMACOM, 2002.
Subject: Computer networks -- Security measures; Internet -- Security measures; Business enterprises -- Computer networks -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
Security, ID systems and locks : the book on electronic access control.
by Konicek, Joel; Boston: Butterworth-Heinemann, 1997.
Subject: Electronic security systems; Buildings -- Security measures; Computer networks -- Security measures; Corporations -- Security measures.
|
|
|
|
|
|
|
|
|
|
|
|
|
Financial cryptography : second international conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings.
Berlin: Springer, 1998.
Subject: Electronic funds transfers -- Security measures -- Congresses; Computer networks -- Security measures -- Congresses; Data encryption (Computer science) -- Congresses; Internet (Computer network) -- Security measures -- Congresses.
|
|
|
|
|
|
|
|
|
|
|
|
|
Financial cryptography : second international conference, FC '98, Anguilla, British West Indies, February 23-25, 1998 : proceedings _ Conference _ FC '98 (2nd : 1998 : Anguilla).
Berlin: Springer, 1998.
Subject: Computer networks - Security measures - Congresses; Data encryption (Computer science - Congresses); Electronic funds transfers - Security measures - Congresses; Internet (Computer network - Security measures - Congresses.
|
|
|
|
|
|
|
|
|
|
« Previous 1 2 3 4 5 6 7 8 Next » |