A process for developing a common vocabulary in the information security area
Enregistré dans:
| Collectivité auteur: | NATO Advanced Research Workshop on a Process for Developing a Common Vocabulary in the Information Security Area Moscow, Russia |
|---|---|
| Autres auteurs: | Knop, J. V. (Jan V.), Salʹnikov, A. A. (Alekseĭ Aleksandrovich), I͡Ashchenko, V. V. |
| Format: | Électronique Actes de congrès eBook |
| Langue: | anglais |
| Publié: |
Amsterdam ; Washington, DC :
IOS Press,
c2007.
|
| Collection: | NATO science for peace and security series. Human and societal dynamics ;
vol. 23. |
| Sujets: | |
| Accès en ligne: | Available in Academic Search Ultimate. Voir à l'OPAC |
| Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Software safety and security : tools for analysis and verification /
Publié: (2012)
Publié: (2012)
Information security in education and practice /
Publié: (2021)
Publié: (2021)
International journal of information security
Publié: (2001)
Publié: (2001)
International journal of information security science
Information security journal
Information systems security
Publié: (1992)
Publié: (1992)
Information security technical report
Publié: (1996)
Publié: (1996)
Security and privacy in the internet of things : challenges and solutions /
Publié: (2020)
Publié: (2020)
Engineering secure and dependable software systems /
Publié: (2019)
Publié: (2019)
Ensuring network security through the use of the honeypot technique /
par: Selvaraj, Rajalakshmi, et autres
Publié: (2020)
par: Selvaraj, Rajalakshmi, et autres
Publié: (2020)
Cyber defense - policies, operations and capacity building : CYDEF 2018 /
Publié: (2019)
Publié: (2019)
Next generation CERTs /
Publié: (2019)
Publié: (2019)
Distributed systems security issues, processes, and solutions /
Publié: (2009)
Publié: (2009)
Journal of information security and applications
Linux server security : hack and defend /
par: Binnie, Christopher
Publié: (2016)
par: Binnie, Christopher
Publié: (2016)
Applications of secure multiparty computation /
Publié: (2015)
Publié: (2015)
Secure multi-party computation /
Publié: (2013)
Publié: (2013)
Critical infrastructure protection against hybrid warfare security related challenges /
Publié: (2016)
Publié: (2016)
Security for the digital world within an ethical framework /
Publié: (2016)
Publié: (2016)
Journal of computer security
Computers & security
Publié: (1982)
Publié: (1982)
Culture, power, and security : new directions in the history of national and international security /
Publié: (2012)
Publié: (2012)
Cybersecurity and resilience in the arctic /
Publié: (2020)
Publié: (2020)
Unauthorised access physical penetration testing for IT security teams /
par: Allsopp, Wil
Publié: (2009)
par: Allsopp, Wil
Publié: (2009)
Selected readings in cybersecurity /
Publié: (2018)
Publié: (2018)
Introducción a la seguridad informática /
par: Baca Urbina, Gabriel
Publié: (2016)
par: Baca Urbina, Gabriel
Publié: (2016)
Mining massive data sets for security : advances in data mining, search, social networks and text mining, and their applications to security /
Publié: (2008)
Publié: (2008)
Secure computer and network systems modeling, analysis and design /
par: Ye, Nong
Publié: (2008)
par: Ye, Nong
Publié: (2008)
Computer security update
Publié: (2000)
Publié: (2000)
Web application defender's cookbook battling hackers and protecting users /
par: Barnett, Ryan C.
Publié: (2013)
par: Barnett, Ryan C.
Publié: (2013)
Reframing the EU's Common Security and Defence Policy : Scripting the Role of the European Army /
par: Rus, Bogdan
Publié: (2024)
par: Rus, Bogdan
Publié: (2024)
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Publié: (2015)
Publié: (2015)
Nuclear security culture from national best practices to international standards /
Publié: (2007)
Publié: (2007)
Cyber security and resiliency policy framework /
Publié: (2014)
Publié: (2014)
Meeting security challenges through data analytics and decision support /
Publié: (2016)
Publié: (2016)
Norwich University journal of information assurance NUJIA.