Implementing Internet Security
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
New Riders
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
amikomlib-3542 |
---|---|
record_format |
oai_dc |
spelling |
amikomlib-35422016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAImplementing Internet SecurityFrederic J. CooperSynopsis: Examining Internet and network security loopholes--including Firewalls, PGP, Public and Private keys, Digital Cash, Digital Signatures, and the Clipper chip--a tutorial to Internet and network security explains how security is implemented in a vNew RidersTEXT |
institution |
Universitas Amikom Yogyakarta |
collection |
Perpustakaan Yogyakarta |
topic |
Synopsis: Examining Internet and network security loopholes--including Firewalls, PGP, Public and Private keys, Digital Cash, Digital Signatures, and the Clipper chip--a tutorial to Internet and network security explains how security is implemented in a v |
spellingShingle |
Synopsis: Examining Internet and network security loopholes--including Firewalls, PGP, Public and Private keys, Digital Cash, Digital Signatures, and the Clipper chip--a tutorial to Internet and network security explains how security is implemented in a v Frederic J. Cooper Implementing Internet Security |
description |
|
format |
TEXT |
author |
Frederic J. Cooper |
author_facet |
Frederic J. Cooper |
author_sort |
Frederic J. Cooper |
title |
Implementing Internet Security |
title_short |
Implementing Internet Security |
title_full |
Implementing Internet Security |
title_fullStr |
Implementing Internet Security |
title_full_unstemmed |
Implementing Internet Security |
title_sort |
implementing internet security |
publisher |
New Riders |
publishDate |
|
_version_ |
1742475860790738944 |