-
1
-
-
0038454039
-
-
Access Denied.; McGraw-Hill/Osborne, 2001
-
Cronkhite, C. and McCullough, J., 2001. Access Denied. Hackers, McGraw-Hill/Osborne, 2001, p. 261.
-
(2001)
Hackers
, pp. 261
-
-
Cronkhite, C.1
McCullough, J.2
-
2
-
-
77950328051
-
Security planning & disaster recovery
-
McGraw-Hill/Osborne, 2002
-
Maiwald, E. and Sieglein, W. 2002. Security Planning & Disaster Recovery. Information Security Policy, McGraw-Hill/Osborne, 2002, p. 61.
-
(2002)
Information Security Policy
, pp. 61
-
-
Maiwald, E.1
Sieglein, W.2
-
3
-
-
0005299868
-
Security architecture - Design, development & operations
-
McGraw-Hill/Osborne, 2001
-
King, C.M., Dalton, C.E. and Osmanoglu, T.E., 2001, Security Architecture - Design, Development & Operations. Business and Application Drivers (Case Study), p. 1; Authorisation and Access Control, pp. 93-94; Basic Intrusion Detection Terminology, McGraw-Hill/Osborne, 2001, pp. 287-288.
-
(2001)
Business and Application Drivers (Case Study), p. 1; Authorisation and Access Control, pp. 93-94; Basic Intrusion Detection Terminology
, pp. 287-288
-
-
King, C.M.1
Dalton, C.E.2
Osmanoglu, T.E.3
-
4
-
-
85031148671
-
-
Dictionary.com; "technology"; "password"
-
Lexico LLC, 2002. Dictionary.com; "technology"; "password", http://www.dictionary.com.
-
(2002)
-
-
Lexico, L.L.C.1
-
5
-
-
85031153729
-
Information security & prevention of computer related crime. What is information security?
-
INFOSEC
-
INFOSEC 2002. Information Security & Prevention of Computer Related Crime. What is Information Security?, http://www.infosec.gov.hk/english/general/infosec/what_infosec.htm.
-
(2002)
-
-
-
6
-
-
25844493386
-
Unlocking knowledge assets
-
Microsoft Press, 2002
-
Conway, S. and Sligar C., 2002. Unlocking Knowledge Assets. Building Taxonomies, Microsoft Press, 2002, pp. 105-124.
-
(2002)
Building Taxonomies
, pp. 105-124
-
-
Conway, S.1
Sligar, C.2
-
7
-
-
25344464879
-
-
Elsevier Science
-
2000-2002. Computers & Security; Elsevier Science; Vol. 19 - Vol. 21.
-
(2000)
Computers & Security
, vol.19-21
-
-
-
8
-
-
4243618675
-
-
Elsevier Science
-
2000 - 2002. Computer Fraud & Security; Elsevier Science; Vol. 2000 - Vol. 2002.
-
(2000)
Computer Fraud & Security
, vol.2000-2002
-
-
-
9
-
-
4244036639
-
-
Elsevier Science
-
2000 - 2002. Network Security, Elsevier Science; Vol. 2000 - Vol. 2002.
-
(2000)
Network Security
, vol.2000-2002
-
-
-
10
-
-
0346889631
-
Internet & TCP/IP network security - Securing protocols and applications
-
McGraw-Hill, 1996
-
Pabrai, U.O., Gurbani, V.K., 1996. Internet & TCP/IP Network Security - Securing Protocols and Applications. Firewall Systems, McGraw-Hill, 1996, pp. 163-181.
-
(1996)
Firewall Systems
, pp. 163-181
-
-
Pabrai, U.O.1
Gurbani, V.K.2
-
14
-
-
0037777131
-
Hackers beware - Defending your network from the Wiley Hacker
-
New Riders Publishing, 2002
-
Cole, E., 2002. Hackers Beware - Defending Your Network from the Wiley Hacker. Install Intrusion Detection Systems. New Riders Publishing, 2002, pp. 238-239.
-
(2002)
Install Intrusion Detection Systems
, pp. 238-239
-
-
Cole, E.1
-
16
-
-
0038114682
-
Hacking exposed
-
McGraw-Hill/Osborne, 2002
-
McClure, S., Scrambray, J. and Kurtz, G., 2002. Hacking Exposed. Cryptography, Third Edition, McGraw-Hill/Osborne, 2002, p. 581.
-
(2002)
Cryptography, Third Edition
, pp. 581
-
-
McClure, S.1
Scrambray, J.2
Kurtz, G.3
-
18
-
-
0038114684
-
Vulnerability analysis: A special case
-
Macmillan Technical Publishing, 2000
-
Bace, R.G., "Vulnerability Analysis: A Special Case",; Macmillan Technical Publishing, 2000, pp. 134-154.
-
(2000)
, pp. 134-154
-
-
Bace, R.G.1
-
19
-
-
0004145060
-
-
New Riders Publishing, 2000
-
Northcutt, S., Novak, J. and McLachlan, D., 2001. Network Intrusion Detection - An Analyst's Handbook, Second Edition, New Riders Publishing, 2000. 2000.
-
(2001)
Network Intrusion Detection - an Analyst's Handbook, Second Edition
-
-
Northcutt, S.1
Novak, J.2
McLachlan, D.3
-
21
-
-
4243584275
-
Access control
-
Artech House Incorporated
-
Oppliger, R., "Access Control", Artech House Incorporated, 1998, pp. 91-147.
-
(1998)
, pp. 91-147
-
-
Oppliger, R.1
-
24
-
-
85031154076
-
Certificates
-
Phleeger, C.P., "Certificates", pp. 135-145
-
-
-
Phleeger, C.P.1
-
25
-
-
4243689006
-
Mandatory and discretionary access control
-
Prentice Hall; Second Edition
-
Phleeger, C. P., "Mandatory and Discretionary Access Control", p. 290; Prentice Hall; Second Edition, 1997.
-
(1997)
, pp. 290
-
-
Phleeger, C.P.1
-
28
-
-
0037777133
-
Certifying authorities and the public key infrastructure
-
Addison Wesley, 1998
-
Stein, L.D., 1998. Certifying Authorities and the Public Key Infrastructure. Web Security - A Step-by-Step Reference Guide, Addison Wesley, 1998, pp. 25-28.
-
(1998)
Web Security - a Step-by-Step Reference Guide
, pp. 25-28
-
-
Stein, L.D.1
-
29
-
-
4243869969
-
Are firewalls enough?
-
Tiwana, A., 1999. "Are Firewalls Enough?", pp. 112-135
-
(1999)
, pp. 112-135
-
-
Tiwana, A.1
-
30
-
-
0037777137
-
Securing transactions with digital certificates
-
Digital Press
-
Tiwana, A., "Securing Transactions with Digital Certificates", pp. 211-227. Web Security, Digital Press, 1999.
-
(1999)
Web Security
, pp. 211-227
-
-
Tiwana, A.1
-
31
-
-
0038454051
-
Virtual private networks
-
Prentice-Hall, 1999
-
Comer, D.E., 1999. Virtual Private Networks. Computer Networks and Intranets, Prentice-Hall, 1999, p. 191.
-
(1999)
Computer Networks and Intranets
, pp. 191
-
-
Comer, D.E.1
-
32
-
-
85031154664
-
CyberCop monitor
-
Network Associates
-
Network Associates 2002. CyberCop Monitor. PGP Securities http://www.pgp.com/products/cybercopmonitor/default.asp.
-
(2002)
PGP Securities
-
-
-
34
-
-
85031146916
-
-
Symantec
-
Symantec 2002. Products, "Symantec NetRecon 3.5"; http://enterprisesecurity.symantec.com/products/products.
-
(2002)
Products, "Symantec NetRecon 3.5"
-
-
-
35
-
-
85031158803
-
-
SNORT.ORG
-
SNORT.ORG; 2002; Snort; "Snort"; http://www.snort.org.
-
(2002)
Snort; "Snort"
-
-
-
36
-
-
22944433766
-
Realsecure gigabit network sensor 7.0
-
Internet Security Systems; Internet Security Systems Incorporated
-
Internet Security Systems 2002. Internet Security Systems Incorporated; "RealSecure Gigabit Network Sensor 7.0"; http://www.iss.net.
-
(2002)
-
-
-
37
-
-
85031151871
-
Cisco IDS (formerly netranger) - Intrusion detection system
-
Cisco Systems
-
Cisco Systems 2002. Cisco Documentation; "Cisco IDS (Formerly NetRanger) - Intrusion Detection System"; http://www.dictionary.com/search?q=technology.
-
(2002)
Cisco Documentation
-
-
|