A process for developing a common vocabulary in the information security area
Na minha lista:
| Autor Corporativo: | NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area Moscow, Russia |
|---|---|
| Outros Autores: | Knop, J. V. (Jan V.), Salʹnikov, A. A. (Alekseĭ Aleksandrovich), I͡Ashchenko, V. V. |
| Formato: | Recurso Electrónico Procedimiento de la Conferencia livro electrónico |
| Idioma: | inglês |
| Publicado em: |
Amsterdam ; Washington, DC :
IOS Press,
c2007.
|
| Colecção: | NATO science for peace and security series. Human and societal dynamics ;
vol. 23. |
| Assuntos: | |
| Acesso em linha: | Available in Academic Search Ultimate. Ver en el OPAC |
| Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Software safety and security : tools for analysis and verification /
Publicado em: (2012)
Publicado em: (2012)
Information security in education and practice /
Publicado em: (2021)
Publicado em: (2021)
International journal of information security
Publicado em: (2001)
Publicado em: (2001)
International journal of information security science
Information security journal
Information systems security
Publicado em: (1992)
Publicado em: (1992)
Information security technical report
Publicado em: (1996)
Publicado em: (1996)
Security and privacy in the internet of things : challenges and solutions /
Publicado em: (2020)
Publicado em: (2020)
Engineering secure and dependable software systems /
Publicado em: (2019)
Publicado em: (2019)
Ensuring network security through the use of the honeypot technique /
Por: Selvaraj, Rajalakshmi, et al.
Publicado em: (2020)
Por: Selvaraj, Rajalakshmi, et al.
Publicado em: (2020)
Cyber defense - policies, operations and capacity building : CYDEF 2018 /
Publicado em: (2019)
Publicado em: (2019)
Next generation CERTs /
Publicado em: (2019)
Publicado em: (2019)
Distributed systems security issues, processes, and solutions /
Publicado em: (2009)
Publicado em: (2009)
Journal of information security and applications
Linux server security : hack and defend /
Por: Binnie, Christopher
Publicado em: (2016)
Por: Binnie, Christopher
Publicado em: (2016)
Applications of secure multiparty computation /
Publicado em: (2015)
Publicado em: (2015)
Secure multi-party computation /
Publicado em: (2013)
Publicado em: (2013)
Critical infrastructure protection against hybrid warfare security related challenges /
Publicado em: (2016)
Publicado em: (2016)
Security for the digital world within an ethical framework /
Publicado em: (2016)
Publicado em: (2016)
Journal of computer security
Computers & security
Publicado em: (1982)
Publicado em: (1982)
Culture, power, and security : new directions in the history of national and international security /
Publicado em: (2012)
Publicado em: (2012)
Cybersecurity and resilience in the arctic /
Publicado em: (2020)
Publicado em: (2020)
Unauthorised access physical penetration testing for IT security teams /
Por: Allsopp, Wil
Publicado em: (2009)
Por: Allsopp, Wil
Publicado em: (2009)
Selected readings in cybersecurity /
Publicado em: (2018)
Publicado em: (2018)
Introducción a la seguridad informática /
Por: Baca Urbina, Gabriel
Publicado em: (2016)
Por: Baca Urbina, Gabriel
Publicado em: (2016)
Mining massive data sets for security : advances in data mining, search, social networks and text mining, and their applications to security /
Publicado em: (2008)
Publicado em: (2008)
Secure computer and network systems modeling, analysis and design /
Por: Ye, Nong
Publicado em: (2008)
Por: Ye, Nong
Publicado em: (2008)
Computer security update
Publicado em: (2000)
Publicado em: (2000)
Web application defender's cookbook battling hackers and protecting users /
Por: Barnett, Ryan C.
Publicado em: (2013)
Por: Barnett, Ryan C.
Publicado em: (2013)
Reframing the EU's Common Security and Defence Policy : Scripting the Role of the European Army /
Por: Rus, Bogdan
Publicado em: (2024)
Por: Rus, Bogdan
Publicado em: (2024)
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Publicado em: (2015)
Publicado em: (2015)
Nuclear security culture from national best practices to international standards /
Publicado em: (2007)
Publicado em: (2007)
Cyber security and resiliency policy framework /
Publicado em: (2014)
Publicado em: (2014)
Meeting security challenges through data analytics and decision support /
Publicado em: (2016)
Publicado em: (2016)
Norwich University journal of information assurance NUJIA.
Registos relacionados
-
Software safety and security : tools for analysis and verification /
Publicado em: (2012) -
Information security in education and practice /
Publicado em: (2021) -
International journal of information security
Publicado em: (2001) - International journal of information security science
- Information security journal