Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Security patterns in practice...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Security patterns in practice : designing secure architectures using software patterns / by Eduardo B. Fernandez.
Saved in:
Bibliographic Details
Main Author:
Fernandez, Eduardo B., 1936-
Format:
eBook
Language:
English
Published:
Chichester, U.K. :
J. Wiley & Sons,
©2013.
Subjects:
Computer networks
>
Security measures.
Computer architecture.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Security
>
General.
Computer architecture
Computer networks
>
Security measures
Online Access:
Click for online access
Holdings
Description
Table of Contents
Similar Items
Staff View
Similar Items
Security for service oriented architectures
by: Williams, Walter (Telecommunications engineer)
Published: (2014)
Network and security issues for internet mobile entertainment.
Published: (2004)
Network and system security
Published: (2014)
Network security JumpStart
by: Strebe, Matthew
Published: (2002)
Cisco security professional's guide to secure intrusion detection systems
Published: (2003)
Security sage's guide to hardening the network infrastructure
Published: (2004)
Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers
Published: (2020)
Securing IM and P2P applications for the enterprise
Published: (2006)
Advances in cyber security : technology, operations, and experiences
Published: (2013)
Web security : a whitehat perspective
by: Wu, Hanqing, et al.
Published: (2015)
Secure computer and network systems : modeling, analysis and design
by: Ye, Nong, 1964-
Published: (2008)
Developer's guide to web application security
by: Cross, Michael, 1965-
Published: (2007)
The complete guide to SCION : from design principles to formal verification
by: Chuat, Laurent, et al.
Published: (2022)
Introduction to network security : theory and practice
by: Wang, Jie, 1961-
Published: (2015)
Build your own security lab : a field guide for network testing
by: Gregg, Michael (Michael C.)
Published: (2008)
Security of self-organizing networks : MANET, WSN, WMN, VANET
Published: (2011)
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
by: Winterfeld, Steve
Published: (2012)
Special issue on internet security
Published: (2002)
Hack proofing your network
Published: (2002)
Nokia network security : solutions handbook
by: Maxwell, Doug, CCSI
Published: (2002)
Managing and securing a Cisco structured wireless-aware network
Published: (2004)
Nmap 6 : network exploration and security auditing Cookbook
by: Pale, Paulino Calderon
Published: (2012)
Internet of Things Security
by: Shandilya, Shishir K.
Published: (2018)
Building an intelligence-led security program
by: Liska, Allan
Published: (2014)
Implementing NAP and NAC security technologies : the complete guide to network access control
by: Hoffman, Daniel (Daniel V.), 1972-
Published: (2008)
Cybersecurity today and tomorrow : pay now or pay later
Published: (2002)
Enemy at the water cooler : real-life stories of insider threats and Enterprise Security Management countermeasures
by: Contos, Brian T.
Published: (2006)
SSL and TLS : Theory and Practice.
by: Oppliger, Rolf
Published: (2009)
Best Practices in Computer Network Defense : Incident Detection and Response.
by: Hathaway, M.
Published: (2014)
Web commerce security : design and development
by: Nahari, Hadi
Published: (2011)
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
by: Zalewski, Michal
Published: (2005)
Managing Cisco network security
Published: (2002)
Designing and building enterprise DMZs
Published: (2006)
Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings
Published: (2020)
Secure semantic service-oriented systems
by: Thuraisingham, Bhavani M.
Published: (2011)
Risks and security of internet and systems : 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised selected papers
Published: (2023)
Integrated security systems design : concepts, specifications, and implementation
by: Norman, Thomas L.
Published: (2007)
Risks and security of Internet and systems : 16th international conference, CRiSIS 2021, virtual event, Ames, USA. November 12-13, 2021 : revised selected papers
Published: (2022)
Firewall policies and VPN configurations
Published: (2006)
Cisco PIX firewalls : configure, manage, & troubleshoot
Published: (2005)
Prev
Next
Similar Items
Security for service oriented architectures
by: Williams, Walter (Telecommunications engineer)
Published: (2014)
Network and security issues for internet mobile entertainment.
Published: (2004)
Network and system security
Published: (2014)
Network security JumpStart
by: Strebe, Matthew
Published: (2002)
Cisco security professional's guide to secure intrusion detection systems
Published: (2003)