1325 results in Communications, Information Theory and Security
II - E-system and network security tools
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 73-74
-
- Chapter
- Export citation
7 - E-services security
- from III - E-security applications
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 145-168
-
- Chapter
- Export citation
2 - Public key cryptosystems
- from I - E-security
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 25-47
-
- Chapter
- Export citation
I - E-security
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 1-2
-
- Chapter
- Export citation
1 - Introduction to e-security
- from I - E-security
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 3-24
-
- Chapter
-
- You have access
- Export citation
4 - Public key infrastructure (PKI) systems
- from II - E-system and network security tools
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 75-98
-
- Chapter
- Export citation
5 - Biometric-based security systems
- from II - E-system and network security tools
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 99-118
-
- Chapter
- Export citation
Contents
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp vii-xiv
-
- Chapter
- Export citation
Index
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 351-357
-
- Chapter
- Export citation
13 - Protecting against malware
- from IV - Protecting enterprises
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 298-324
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp i-vi
-
- Chapter
- Export citation
12 - Virtual private networks
- from IV - Protecting enterprises
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 274-297
-
- Chapter
- Export citation
11 - Intrusion detection systems
- from IV - Protecting enterprises
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 249-273
-
- Chapter
- Export citation
8 - E-government security
- from III - E-security applications
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 169-195
-
- Chapter
- Export citation
III - E-security applications
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 143-144
-
- Chapter
- Export citation
3 - Authentication and digital signature
- from I - E-security
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 48-72
-
- Chapter
- Export citation
IV - Protecting enterprises
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 247-248
-
- Chapter
- Export citation
14 - Computer and network security risk management
- from IV - Protecting enterprises
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 325-350
-
- Chapter
- Export citation
Preface
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp xv-xviii
-
- Chapter
- Export citation
10 - Wireless LANs security
- from III - E-security applications
-
- Book:
- Security of e-Systems and Computer Networks
- Published online:
- 11 September 2009
- Print publication:
- 14 June 2007, pp 218-246
-
- Chapter
- Export citation