Network Security

Sort these publications by...

Results Found

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

  • Author: Sigler, Ken Shoemaker, Dan ...

Not yet published: available to order Availability help (opens in new window)

Security in Network Functions Virtualization

Security in Network Functions Virtualization

Not yet published: available to order Availability help (opens in new window)

Codes, Cryptology and Curves with Computer Algebra

NewCodes, Cryptology and Curves with Computer Algebra

  • Author: Pellikaan, Ruud Wu, Xin-Wen ...

In Stock: 3 - 5 days Availability help (opens in new window)

Adversarial Machine Learning

NewAdversarial Machine Learning

  • Author: Joseph, Anthony D. Nelson, Bl...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Attribute-Based Access Control

NewAttribute-Based Access Control

  • Author: Hu, Vincent C. Ferraiolo, Dav...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)