Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Security patterns in practice...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Security patterns in practice : designing secure architectures using software patterns / by Eduardo B. Fernandez.
Annotation
Saved in:
Bibliographic Details
Main Author:
Fernandez, Eduardo B., 1936-
Format:
eBook
Language:
English
Published:
Chichester, U.K. :
J. Wiley & Sons,
©2013.
Subjects:
Computer networks
>
Security measures.
Computer architecture.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Security
>
General.
Computer architecture
Computer networks
>
Security measures
Online Access:
Click for online access
Holdings
Description
Table of Contents
Similar Items
Staff View
Similar Items
Network and security issues for internet mobile entertainment.
Published: (2004)
Security for service oriented architectures
by: Williams, Walter (Telecommunications engineer)
Published: (2014)
Network and system security
Published: (2014)
Network security JumpStart
by: Strebe, Matthew
Published: (2002)
Security sage's guide to hardening the network infrastructure
Published: (2004)
Cisco security professional's guide to secure intrusion detection systems
Published: (2003)
Advances in cyber security : technology, operations, and experiences
Published: (2013)
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers
Published: (2020)
Securing IM and P2P applications for the enterprise
Published: (2006)
Secure computer and network systems : modeling, analysis and design
by: Ye, Nong, 1964-
Published: (2008)
Web security : a whitehat perspective
by: Wu, Hanqing, et al.
Published: (2015)
Introduction to network security : theory and practice
by: Wang, Jie, 1961-
Published: (2015)
Developer's guide to web application security
by: Cross, Michael, 1965-
Published: (2007)
The complete guide to SCION : from design principles to formal verification
by: Chuat, Laurent, et al.
Published: (2022)
Build your own security lab : a field guide for network testing
by: Gregg, Michael (Michael C.)
Published: (2008)
Security of self-organizing networks : MANET, WSN, WMN, VANET
Published: (2011)
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
by: Winterfeld, Steve
Published: (2012)
Hack proofing your network
Published: (2002)
Special issue on internet security
Published: (2002)
Nokia network security : solutions handbook
by: Maxwell, Doug, CCSI
Published: (2002)
Managing and securing a Cisco structured wireless-aware network
Published: (2004)
Building an intelligence-led security program
by: Liska, Allan
Published: (2014)
Nmap 6 : network exploration and security auditing Cookbook
by: Pale, Paulino Calderon
Published: (2012)
Cybersecurity today and tomorrow : pay now or pay later
Published: (2002)
Implementing NAP and NAC security technologies : the complete guide to network access control
by: Hoffman, Daniel (Daniel V.), 1972-
Published: (2008)
Internet of Things Security
by: Shandilya, Shishir K.
Published: (2018)
SSL and TLS : Theory and Practice.
by: Oppliger, Rolf
Published: (2009)
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
by: Contos, Brian T.
Published: (2006)
Best Practices in Computer Network Defense : Incident Detection and Response.
by: Hathaway, M.
Published: (2014)
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
by: Zalewski, Michal
Published: (2005)
Designing and building enterprise DMZs
Published: (2006)
Managing Cisco network security
Published: (2002)
Cisco PIX firewalls : configure, manage, & troubleshoot
Published: (2005)
Firewall policies and VPN configurations
Published: (2006)
Web commerce security : design and development
by: Nahari, Hadi
Published: (2011)
Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings
Published: (2020)
Risks and security of internet and systems : 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised selected papers
Published: (2023)
Integrated security systems design : concepts, specifications, and implementation
by: Norman, Thomas L.
Published: (2007)
Risks and security of Internet and systems : 16th international conference, CRiSIS 2021, virtual event, Ames, USA. November 12-13, 2021 : revised selected papers
Published: (2022)
Cyber security : 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022 : revised selected papers
Published: (2022)
Prev
Next
Similar Items
Network and security issues for internet mobile entertainment.
Published: (2004)
Security for service oriented architectures
by: Williams, Walter (Telecommunications engineer)
Published: (2014)
Network and system security
Published: (2014)
Network security JumpStart
by: Strebe, Matthew
Published: (2002)
Security sage's guide to hardening the network infrastructure
Published: (2004)