Skip to contents

  1. Gasser, Morrie [Author]

    Building a secure computer system

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York: Van Nostrand Reinhold Co., 1988

  2. Cronk, R. Jason [Author]

    Strategic Privacy by Design - [Second edition]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Portsmouth, NH: International Association of Privacy Professionals (IAPP), [2022]

    Published in: An IAPP Publication

  3. Levy, Joe [Editor]; Tran, Khai [Editor]; Lydon, Patrick [Editor]

    SonicWALL secure wireless network : integrated solutions guide ; [official guide from SonicWall ; written by SonicWall engineers and documentation specialists ; appropriate for all audiences from the small proprietor to the enterprise IT specialist ; a complete reference to plan, design, implement, and optimize a secure wireless network with SonicWall's extensive wireless product offerings]/ Joe Levy; Khai Tran; Patrick Lydon [Hrsg.]

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress, 2008

  4. Koç, Çetin Kaya [Editor]

    Cryptographic engineering

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York, NY: Springer, 2009