Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6)
 
  Security and Protection (D.4.6) See Reviews  
 
Subject Descriptors:
Access Controls (125)
Authentication (52)
Cryptographic Controls (97)
Information Flow Controls (29)
Invasive Software (33)
Security Kernels (6)
Verification (11)
 
Proper Nouns:
Xenix (1)
 
 
Reviews limited to:
 
 

Reviews about "Security and Protection (D.4.6)":
Securing 5G and evolving architectures
Nair P.,  Addison-Wesley Professional, Boston, MA, 2021. 624 pp. Type: Book (978-0-137457-93-9)
Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J.,  Springer International Publishing, New York, NY, 2021. 283 pp. Type: Book (978-3-030105-90-7), Reviews: (2 of 2)
Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J.,  Springer International Publishing, New York, NY, 2021. 283 pp. Type: Book (978-3-030105-90-7), Reviews: (1 of 2)
Cybersecurity in digital transformations: scope and applications
Möller D.,  Springer International Publishing, Cham, Switzerland, 2020. 133 pp. Type: Book (978-3-030605-69-8)
Security, privacy and user interaction
Jakobsson M.,  Springer International Publishing, New York, NY, 2020. 153 pp. Type: Book (978-3-030437-53-4)
Secure and effective implementation of an IOTA light node using STM32
Stucchi D., Susella R., Fragneto P., Rossi B.  BlockSys 2019 (Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY,  Nov 10, 2019) 28-29, 2019. Type: Proceedings
 Foundations of information security: a straightforward introduction
Andress J.,  No Starch Press, San Francisco, CA, 2019. 248 pp. Type: Book (978-1-718500-04-4)
more...
Related Topics
D.4.6 Security and Protection
  - Security and Protection
   
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy