Language
English
German
^M
Dutch
Spanish
Source:
Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition [0-470-06852-3; 1-118-00836-7] Anderson, Ross
yr:2008 pg:XL -1040S.:Ill.,graph.Darst.
Basic
Sorry, no full text available...
Please use the document delivery service (see below)
Document delivery
Request document via
Library/Bibliothek
Citation information
Check
Google Book Search
The entire book is viewable at Google Book Search
A portion of this book is viewable at Google Book Search
Information about this book can be found at Google Book Search
Information about this book can be found at Google Book Search
Users interested in this article also expressed an interest in the following:
description
1.
Harris, S.
CISSP All-in-One Exam Guide, 6th Edition.
description
2.
Harris, S.
CISSP.
2008.
description
3.
Schneier, B.
Applied cryptography: protocols, algorithms, and source code in C.
1995.
description
4.
Die, W.
"New directions in cryptography."
IEEE transactions on information theory
22.6 (1976): 644-654.
description
5.
Johnston, M.
"Syndromes of Corruption."
Syndromes of corruption : wealth, power, and democracy /.
Cambridge University Press,, 2005. 1-267.
description
6.
Schneier, Bruce K.
Applied cryptography: protocols, algorithms, and source code in C.
Wiley,, 2015.
description
7.
Basin, D.
"Applied information security."
Applied Information Security.
2011.
description
8.
Rivest, R. L.
"A method for obtaining digital signatures and public-key cryptosystems."
Communications of the ACM
21.2 (1978): 120-126.
description
9.
Karklins, R.
"Syndromes of Corruption: Wealth, Power, and Democracy Syndromes of Corruption: Wealth, Power, and Democracy. By Michael Johnston.(Cambridge University Press, 2005.)."
The Journal of politics
69.01 (2008): 260-261.
description
10.
Ekert, Artur K.
"Quantum cryptography based on Bell's theorem."
Physical review letters
67.6 (1991): 661-663.
description
11.
Vinod, V.
Application Security in the ISO27001 Environment.
description
12.
Harris, S.
CISSPĀ® All-in-One Exam Guide, Fifth Edition.
description
13.
McNab, C.
Network Security Assessment, 2nd Edition.
description
14.
Arce, M.
"Resource Wealth, Democracy and Mobilisation."
The journal of development studies
54.6: 949-967.
description
15.
Lipford, J.
"Determining Economic Freedom: Democracy, Political Competition, and the Wealth Preservation Struggle."
Journal of Private Enterprise
30.3 (2015): 1-18.
description
16.
You, J.
Democracy, Inequality and Corruption.
2014.
description
17.
Harris, S.
CISSP practice exams.
description
18.
Poole, O.
"Network Security."
Network Security : A Practical Guide.
2003.
description
19.
Andrew, ANDREW T.
Computer Networks (5th Edition).
description
20.
Whittaker, James A.
Exploratory software testing.
2009.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
RefWorks
EndNote
ProCite
Reference Manager
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
author:
Anderson, Ross J
last name
initials
Other articles by this author? -- in
Online Contents Geosciences
author:
Anderson, Ross J
last name
initials
Reference
Download Record for
Endnote
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Check
Google Book Search
Title
Author
ISBN
General
Title
Author
ISBN
General
Search Terms:
Search for related information in
Google Scholar
Book Title
Author Name
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.