The Modelling and Analysis of Security Protocols: the CSP Approach /
Security protocols are one of the most critical elements in enabling the secure communication and processing of information, ensuring its confidentiality, integrity, authenticity and availability. These protocols are vulnerable to a host of subtle attacks, so designing protocols to be impervious to...
Autores principales: | Ryan, P. (Autor), Schneider, S. (Autor) |
---|---|
Autor Corporativo: | Safari, an O'Reilly Media Company |
Otros Autores: | Schneider, S. A. (Steve A.) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Pearson Business,
2000.
|
Edición: | 1st edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Cisco bring your own device (BYOD) networking /
por: Redmon, Kevin
Publicado: (2014) -
Implementing NAP and NAC security technologies : the complete guide to network access control /
por: Hoffman, Daniel (Daniel V.), 1972-
Publicado: (2008) -
Cisco ISE for BYOD and secure unified access /
por: Woland, Aaron T., et al.
Publicado: (2017) -
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques /
por: Fadyushin, Vyacheslav, et al.
Publicado: (2016) -
Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques /
por: Fadyushin, Vyacheslav, et al.
Publicado: (2016)