Search Results - Bishop, Matt
- Showing 1 – 20 results of 22
- Go to Next Page
-
1Computer security: art and sciencePublished 2019Call Number: Loading…Read online
Located: Loading…
Electronic eBook Loading… -
2The transfer of information and authority in a protection systemPublished 1979Call Number: Loading…
Located: Loading…Book Loading… -
3Computer security: art and sciencePublished 2019Call Number: Loading…Table of Contents
Located: Loading…
Book Loading… -
4Computer security: art and sciencePublished 2003Call Number: Loading…
Located: Loading…Book Loading… -
5Computer security: art and sciencePublished 2003Call Number: Loading…
Located: Loading…Book Loading… -
6Introduction to Computer SecurityPublished 2004Call Number: Loading…Read online
Located: Loading…
Electronic eBook Loading… -
7Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, ProceedingsPublished 2015Call Number: Loading…Table of Contents
Located: Loading…
Read online (LMU)
Available at the library of LMU.
Read online (HM)
Available at the library of Hochschule Munich University of Applied Sciences (HM).
Order via interlibrary loanElectronic eBook Loading… -
8Proceedings of the 2008 New Security Paradigms WorkshopPublished 2009Call Number: Loading…Read online (LMU)
Located: Loading…
Available at the library of LMU.
Order via interlibrary loanElectronic eBook Loading… -
9Proceedings of the 2010 Workshop on Governance of Technology, Information and PoliciesPublished 2010Call Number: Loading…Read online (LMU)
Located: Loading…
Available at the library of LMU.
Order via interlibrary loanElectronic eBook Loading… -
10Computer security: art and sciencePublished 2006Call Number: Loading…Table of Contents
Located: Loading…
Order via interlibrary loanBook Loading… -
11Computer security: art and sciencePublished 2005Call Number: Loading…Order via interlibrary loan
Located: Loading…Book Loading… -
12Computer security: art and sciencePublished 2010Call Number: Loading…Order via interlibrary loan
Located: Loading…Book Loading… -
13Computer security: art and sciencePublished 2004Call Number: Loading…Table of Contents
Located: Loading…
Order via interlibrary loanBook Loading… -
14Introduction to computer securityPublished 2004Call Number: Loading…Table of Contents
Located: Loading…
Order via interlibrary loanBook Loading… -
15Computer security: art and sciencePublished 2003Call Number: Loading…Order via interlibrary loan
Located: Loading…Book Loading… -
16Snowdrops: a monograph of the cultivated GalanthusPublished 2001Call Number: Loading…Order via interlibrary loan
Located: Loading…Book Loading… -
17Computer security: art and sciencePublished 2019Call Number: Loading…Order via interlibrary loan
Located: Loading…Electronic eBook Loading… -
18Introduction to computer securityPublished 2005Call Number: Loading…Table of Contents
Located: Loading…
Order via interlibrary loanBook Loading… -
19Computer security: art and sciencePublished 2005Call Number: Loading…Table of Contents
Located: Loading…
Order via interlibrary loanBook Loading… -
20Information security: 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016 : proceedingsPublished 2016Other Authors: “…Bishop, Matt…”
Call Number: Loading…Read online
Located: Loading…
Electronic Conference Proceedings eBook Loading…