Torthaí cuardaigh - "Computers Access control."

  1. 1

    Public-key cryptography de réir Salomaa, Arto

    Foilsithe / Cruthaithe 1996
    LEABHAR
  2. 2

    Applied cryptology, cryptographic protocols, and computer security models.

    Foilsithe / Cruthaithe 1983
    LEABHAR
  3. 3

    Security in computing de réir Pfleeger, Charles P. 1948-

    Foilsithe / Cruthaithe 1989
    LEABHAR
  4. 4

    Security in computing de réir Pfleeger, Charles P.

    Foilsithe / Cruthaithe 1997
    LEABHAR
  5. 5

    Computers under attack intruders, worms, and viruses

    Foilsithe / Cruthaithe 1990
    LEABHAR
  6. 6
  7. 7

    Tough answers to password problems.

    Foilsithe in Manila bulletin
    Alt
  8. 8
  9. 9
  10. 10

    Database security and integrity. de réir Fernandez, Eduardo B.

    Foilsithe / Cruthaithe 1981
    LEABHAR