21st National Information Systems Security Conference

21st National Information Systems Security Conference
Author :
Publisher :
Total Pages : 854
Release :
ISBN-10 : CORNELL:31924083977813
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis 21st National Information Systems Security Conference by :

Download or read book 21st National Information Systems Security Conference written by and published by . This book was released on 1998 with total page 854 pages. Available in PDF, EPUB and Kindle. Book excerpt:


21st National Information Systems Security Conference Related Books

21st National Information Systems Security Conference
Language: en
Pages: 854
Authors:
Categories: Computer security
Type: BOOK - Published: 1998 - Publisher:

DOWNLOAD EBOOK

Information Security Management Handbook, Fifth Edition
Language: en
Pages: 2124
Authors: Harold F. Tipton
Categories: Computers
Type: BOOK - Published: 2003-12-30 - Publisher: CRC Press

DOWNLOAD EBOOK

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an impo
Information Security Management Handbook on CD-ROM, 2006 Edition
Language: en
Pages: 4346
Authors: Micki Krause
Categories: Computers
Type: BOOK - Published: 2006-04-06 - Publisher: CRC Press

DOWNLOAD EBOOK

The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, info
NetCentric and Client/Server Computing
Language: en
Pages: 984
Authors: Anderson Consulting
Categories: Computers
Type: BOOK - Published: 1998-12-18 - Publisher: CRC Press

DOWNLOAD EBOOK

From Federal Express's package tracking Website, to Amazon.com, netcentric computing has been evolving, slowly-but-surely, one solution at a time, since the ear
Information Security Management Handbook
Language: en
Pages: 602
Authors: Harold F. Tipton
Categories: Computers
Type: BOOK - Published: 2004-12-28 - Publisher: CRC Press

DOWNLOAD EBOOK

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an impo