|
|
|
|
|
|
|
|
1 - 10 von 26 |
|
|
Ihre Aktion |
Suchen (Schlagwörter GND (Phrase) (XSP)) access control eingrenzen (Basisklassifikation (XBKL)) 54.38
|
|
|
|
|
|
1. |
Modulare Erweiterungen von Sicherheitsgateways : Aufbau von Virtual Private Networks (VPN) und Integration in Sicherheitsgateways ; Sichere Web-Nutzung mittels Remote-Controlled Browsers Systems (ReCoBS) Deutschland / Bundesamt für Sicherheit in der Informationstechnik. - Köln : Bundesanzeiger-Verl., 2007
|
|
|
|
2. |
Cryptography and network security : principles and practice Stallings, William *1945-*. - 4. ed. - Upper Saddle River, NJ : Pearson/Prentice Hall, 2006
|
|
|
|
3. |
Trusted computing platforms : design and applications Smith, Sean W. *1964-*. - New York : Springer, c2005
|
|
|
|
4. |
Protocol : how control exists after decentralization Galloway, Alexander R. *1974-*. - Cambridge, Massachusetts : The MIT Press, [2004]
|
|
|
|
5. |
Public key cryptography : proceedings Kim, Kwang-jo. - Berlin : Springer, 2001
|
|
|
|
6. |
Fundamentals of cryptology : a professional reference and interactive tutorial Tilborg, Henk C. A. van *1947-*. - Boston [u.a.] : Kluwer Academic, 2000
|
|
|
|
7. |
Information security : third international workshop ; proceedings Pieprzyk, Josef. - Berlin : Springer, 2000
|
|
|
|
8. |
Recent advances in intrusion detection : third international workshop ; proceedings Debar, Hervé. - Berlin : Springer, 2000
|
|
|
|
9. |
Public key cryptography : proceedings Imai, Hideki *1943-*. - Berlin : Springer, 2000
|
|
|
|
10. |
ICSA guide to cryptography Nichols, Randall K.. - New York, NY [u.a.] : McGraw Hill, 1999
|
|
|
|
|
|
|
1 - 10 von 26 |
|
Wort |
|
Typ |
|
Anzahl |
|
access control |
|
Schlagwörter GND (Phrase) (XSP) |
|
125 |
54.38 |
|
Basisklassifikation (XBKL) |
|
697 |
|
|
|
|
|
|
|
1 - 10 von 26 |
|
|