Aller au contenu
Library Home
Start Over
Research Databases
E-Journals
Exemplaires mis en réserve pour un cours
Library Home
Connexion
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Langue
Library Catalog
Tous les champs
Titre
Auteur
Sujet
Cote
ISBN/ISSN
Rechercher
Recherche avancée
|
Parcourir
|
Astuces pour la recherche
Security patterns in practice...
Citer
Envoyer par SMS
Envoyer par courriel
Imprimer
Exporter les notices
Exporter vers RefWorks
Exporter vers EndNoteWeb
Exporter vers EndNote
Ajouter aux favoris
Permalien
Security patterns in practice : designing secure architectures using software patterns / by Eduardo B. Fernandez.
Enregistré dans:
Détails bibliographiques
Auteur principal:
Fernandez, Eduardo B., 1936-
Format:
eBook
Langue:
English
Publié:
Chichester, U.K. :
J. Wiley & Sons,
©2013.
Sujets:
Computer networks
>
Security measures.
Computer architecture.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Security
>
General.
Computer architecture
Computer networks
>
Security measures
Accès en ligne:
Click for online access
Exemplaires
Description
Table des matières
Documents similaires
Affichage MARC
Documents similaires
Security for service oriented architectures
par: Williams, Walter (Telecommunications engineer)
Publié: (2014)
Network and security issues for internet mobile entertainment.
Publié: (2004)
Network and system security
Publié: (2014)
Network security JumpStart
par: Strebe, Matthew
Publié: (2002)
Cisco security professional's guide to secure intrusion detection systems
Publié: (2003)
Security sage's guide to hardening the network infrastructure
Publié: (2004)
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers
Publié: (2020)
Securing IM and P2P applications for the enterprise
Publié: (2006)
Advances in cyber security : technology, operations, and experiences
Publié: (2013)
Web security : a whitehat perspective
par: Wu, Hanqing, et autres
Publié: (2015)
Secure computer and network systems : modeling, analysis and design
par: Ye, Nong, 1964-
Publié: (2008)
Developer's guide to web application security
par: Cross, Michael, 1965-
Publié: (2007)
The complete guide to SCION : from design principles to formal verification
par: Chuat, Laurent, et autres
Publié: (2022)
Introduction to network security : theory and practice
par: Wang, Jie, 1961-
Publié: (2015)
Build your own security lab : a field guide for network testing
par: Gregg, Michael (Michael C.)
Publié: (2008)
Security of self-organizing networks : MANET, WSN, WMN, VANET
Publié: (2011)
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
par: Winterfeld, Steve
Publié: (2012)
Special issue on internet security
Publié: (2002)
Hack proofing your network
Publié: (2002)
Nokia network security : solutions handbook
par: Maxwell, Doug, CCSI
Publié: (2002)
Managing and securing a Cisco structured wireless-aware network
Publié: (2004)
Nmap 6 : network exploration and security auditing Cookbook
par: Pale, Paulino Calderon
Publié: (2012)
Internet of Things Security
par: Shandilya, Shishir K.
Publié: (2018)
Building an intelligence-led security program
par: Liska, Allan
Publié: (2014)
Implementing NAP and NAC security technologies : the complete guide to network access control
par: Hoffman, Daniel (Daniel V.), 1972-
Publié: (2008)
Cybersecurity today and tomorrow : pay now or pay later
Publié: (2002)
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
par: Contos, Brian T.
Publié: (2006)
SSL and TLS : Theory and Practice.
par: Oppliger, Rolf
Publié: (2009)
Best Practices in Computer Network Defense : Incident Detection and Response.
par: Hathaway, M.
Publié: (2014)
Web commerce security : design and development
par: Nahari, Hadi
Publié: (2011)
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
par: Zalewski, Michal
Publié: (2005)
Managing Cisco network security
Publié: (2002)
Designing and building enterprise DMZs
Publié: (2006)
Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings
Publié: (2020)
Secure semantic service-oriented systems
par: Thuraisingham, Bhavani M.
Publié: (2011)
Risks and security of internet and systems : 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised selected papers
Publié: (2023)
Integrated security systems design : concepts, specifications, and implementation
par: Norman, Thomas L.
Publié: (2007)
Risks and security of Internet and systems : 16th international conference, CRiSIS 2021, virtual event, Ames, USA. November 12-13, 2021 : revised selected papers
Publié: (2022)
Firewall policies and VPN configurations
Publié: (2006)
Cisco PIX firewalls : configure, manage, & troubleshoot
Publié: (2005)
Précédent
Suivant
Documents similaires
Security for service oriented architectures
par: Williams, Walter (Telecommunications engineer)
Publié: (2014)
Network and security issues for internet mobile entertainment.
Publié: (2004)
Network and system security
Publié: (2014)
Network security JumpStart
par: Strebe, Matthew
Publié: (2002)
Cisco security professional's guide to secure intrusion detection systems
Publié: (2003)