Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6)
 
  Security and Protection (D.4.6) See Reviews  
 
Subject Descriptors:
Access Controls (125)
Authentication (52)
Cryptographic Controls (99)
Information Flow Controls (30)
Invasive Software (33)
Security Kernels (6)
Verification (11)
 
Proper Nouns:
Xenix (1)
 
 
Reviews limited to:
 
 

Reviews about "Security and Protection (D.4.6)":
 On architecting fully homomorphic encryption-based computing systems
Agrawal R., Joshi A., Springer International Publishing, Cham, Switzerland, 2023. 87 pp.  Type: Book (303131753X)
Viruses in all dimensions: how an information code controls viruses, software and microorganisms
Ball R., Springer International Publishing, New York, NY, 2023. 156 pp.  Type: Book (9783658388256)
The long road ahead to transition to post-quantum cryptography
LaMacchia B., LaMacchia B. Communications of the ACM 65(1): 28-30, 2021.  Type: Article
Securing 5G and evolving architectures
Nair P., Addison-Wesley Professional, Boston, MA, 2021. 624 pp.  Type: Book (978-0-137457-93-9)
Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J., Springer, Switzerland, 2021. 283 pp.  Type: Book (978-3-030105-90-7), Reviews: (2 of 2)
Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J., Springer, Switzerland, 2021. 283 pp.  Type: Book (978-3-030105-90-7), Reviews: (1 of 2)
Cybersecurity in digital transformations: scope and applications
Moller D., Springer, Switzerland, 2020. 133 pp.  Type: Book (978-3-030605-69-8)
more...
Related Topics
D.4.6 Security and Protection
  - Security and Protection
   
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy