×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secure computer system]
© IBM corp, atsec information security 2007 Operating System Evaluations – What security functionality is expected Helmut Kurth, atsec information systems
220 views
The Psychology Behind Security - ISSA Journal Abril 2010
1.276 views
Computer Security
842 views
Documentbi
1.172 views
New Opportunities with Telecommunications Technology change in the telecommunications infrastructure is opening new doors to increased service levels,
213 views
Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing
219 views
1. Introduction to Computer Security Prof. Bharat Bhargava Department of Computer Sciences, Purdue University August 2006 In collaboration with: Prof
225 views
Security Strategies for securing Distributed Systems Generally very similar to techniques used in a non- distributed system, only much more difficult to
216 views
Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005
223 views
Toward A Mathematical Model of Computer Security Gina Duncanson Kevin Jonas Ben Lange John Loff-Peterson Ben Neigebauer
227 views
The Long and Winding Road From the Origins of an HIV Policy to the Development of the MELD System Gloria Taylor, RN, MA, CPTC
213 views
Security Protection Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved
218 views
Next >