Internet of things -- Security measuresSee also what's at your library, or elsewhere.
Broader terms: |
Filed under: Internet of things -- Security measures
Items below (if any) are from related and broader terms.
Filed under: Internet of things
Filed under: Internet of things -- Periodicals
Filed under: Computer networks -- Security measures Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (2003), by Rafeeq Ur Rehman (PDF at phptr.com) Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide) The Internet Under Crisis Conditions: Learning from September 11 (2003), by National Research Council Computer Science and Telecommunications Board (HTML with commentary at NAP) Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at HathiTrust) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at phptr.com)
Filed under: Computer networks -- Security measures -- Government policy -- United StatesFiled under: Computer networks -- Security measures -- United States Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment Information Security and Privacy in Network Environments (Washington: GPO, 1994), by United States Congress Office of Technology Assessment Filed under: Business enterprises -- Computer networks -- Security measures
Filed under: Security measures Management of library security : a SPEC kit / (Washington, DC : Systems and Procedures Exchange Center, Office of Leadership and Management Services, Association of Research Libraries, c1999), by Glen A. Zimmerman and George J. Soete (page images at HathiTrust) Security in special collections / (Washington, D.C. : Association of Research Libraries, Office of Leadership and Management Services, c2004), by Clark Center, Donnelly Lancaster, and Association of Research Libraries. Office of Leadership and Management Services (page images at HathiTrust)
Filed under: Aeronautics, Commercial -- Security measures Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust) Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
Filed under: Air bases, American -- Security measures Defending Air Bases in an Age of Insurgency (2 volumes; Maxwell AFB, AL: Air University Press, 2014-2019), ed. by Shannon W. Caudill
Filed under: Airports -- Security measures Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust) Antiterrorism Measures: The Adequacy of Foreign Airport Security: Staff Report to the Committee on Foreign Affairs, U.S. House of Representatives (Washington: GPO, 1986), by United States House Committee on Foreign Affairs (page images at HathiTrust) Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
Filed under: Command and control systems -- United States -- Security measures
Filed under: Confederate States of America -- Security measures
Filed under: Cyberinfrastructure -- Security measures Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
Filed under: Dwellings -- Security measures
Filed under: Electronic data processing -- United States -- Security measuresFiled under: Electronic data processing departments -- Security measures Guidelines for Formal Verification Systems (1989), by Barbara Mayer and Monica Mcgill Lu (HTML at fas.org) Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at fas.org) A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org) Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1987), by National Computer Security Center (U.S.) (text at nist.gov) Trusted Product Evaluation Questionnaire (version 2, 1992), by National Computer Security Center (U.S.) (HTML at usmc.mil) Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org) Trusted Network Interpretation Environments Guideline, by National Computer Security Center (U.S.) (HTML at fas.org)
More items available under broader and related terms at left. |