Listing 1 - 10 of 26 | << page >> |
Sort by
|
Choose an application
681.3*D46 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Informatiebeveiliging --- Informatiebeveiliging. --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)
Choose an application
Computers --- Electronic data processing departments --- Ordinateurs --- Informatique, Centres d' --- Access control --- Congresses --- Security measures --- Accès --- Contrôle --- Congrès --- Sûreté --- Mesures --- 681.3*K65 --- Computer security --- -Electronic data processing departments --- -681.3*D46 --- 681.3*K41 --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computerwetenschap--?*K65 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K41 --- Congresses. --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3*D46 --- Security measures&delete&
Choose an application
Cryptography. --- Ciphers. --- Cryptography --- Ciphers --- Cryptographie --- Chiffres (Cryptographie) --- History. --- History --- Histoire --- cryptologie --- 003.26 --- 681.3*D46 --- Cryptografische schriftsoorten. Geheimschrift --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 003.26 Cryptografische schriftsoorten. Geheimschrift --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Data encryption (Computer science) --- Telecommunication services --- Computer architecture. Operating systems --- Cryptography - History
Choose an application
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials. Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org.
Computer. Automation --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- 681.3*D46 --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)
Choose an application
003.26 --- 65.012.8 --- 681.3*D46 --- 519.72 --- 681.3 --- 681.3.02 --- 681.324 --- Computernetwerken (Netwerken informatica) --- Cryptography (Cryptografie, Netwerkbeveiliging) --- ICT-Informatie- en communicatietechnologie --- Informatiebeveiliging --- Cryptografie --- Maple --- Netwerkbeveiliging --- Cryptografische schriftsoorten. Geheimschrift --- Maintenance of secrecy. Protection of confidential information. Security --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 65.012.8 Maintenance of secrecy. Protection of confidential information. Security --- 003.26 Cryptografische schriftsoorten. Geheimschrift
Choose an application
Electronic data processing departments --- Computer security --- Security measures --- -681.3*Cm --- 681.3*D46 --- 681.3*K4 --- Computer centers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computerwetenschap--?*Cm --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K4 --- Computer security. --- Security measures. --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cyber security --- Cybersecurity --- 681.3*Cm --- Computer department security measures --- Protection of computer systems --- Protection --- Electronic data processing departments - Security measures
Choose an application
681.3*C2 --- 681.3*D46 --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer networks --- Computer security. --- Security measures. --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection --- 681.3 *C2
Choose an application
681.3*C20 --- 681.3*D46 --- TCP/IP --- protocollen --- informatica --- 528.5 --- Computer-communication networks: general: data communications, opensystems interconnection reference model (OSI), security and protection (e.g., firewalls) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- internet, extranet, intranet --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- TCP/IP (Computer network protocol) --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Computer network protocols --- 6813*C20
Choose an application
681.3*D46 --- Computer networks --- -005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security measures. --- Security measures --- Distributed processing --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Réseaux d'ordinateurs --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- Sécurité --- 005.8
Choose an application
Computers --- -Programming languages (Electronic computers) --- 681.3*D46 --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Access control --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Programming languages (Electronic computers). --- Access control. --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Programming languages (Electronic computers) --- Computer security
Listing 1 - 10 of 26 | << page >> |
Sort by
|