Trusted computing / edited by Chris Mitchell.
Material type: TextSeries: IEE professional applications of computing series ; 6Publication details: London : Institution of Electrical Engineers, c2005Description: xiv, 313 p. : ill. ; 24 cmISBN: 9780863415258 (hbk.); 0863415253 (hbk.)Subject(s): Computer security | Computer networks -- Security measuresDDC classification: 005.8 LOC classification: QA76.9.A25 | T78 2005Online resources: Table of contents only | Publisher descriptionItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APU Library Open Shelf | Book | QA76.9.A25 T78 2005 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00007404 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 T46 2017 c.1 Use of cyber threat intelligence in security operations center / | QA76.9.A25 T46 2018 c.1 Security Operations Center - SIEM Use Cases and Cyber Threat Intelligence / | QA76.9.A25 T53 2006 c.1 Firewalls and VPNs : | QA76.9.A25 T78 2005 c.1 Trusted computing / | QA76.9.A25 T78 2007 c.1 Trust, privacy and security in digital business : | QA76.9.A25 V33 2005 c.1 Computer forensics : | QA76.9.A25 V33 2005 c.2 Computer forensics : |
Includes bibliographical references and index.
There are no comments on this title.