Jump to main content
図書

Artech House computer security series

Icons representing 図書

Artech House computer security series

Material type
図書
Author
-
Publisher
Artech House
Publication date
-
Material Format
Paper
Capacity, size, etc.
-
NDC
-
View All

Related materials as well as pre- and post-revision versions

Implementing security for ATM networksLeave the NDL website. Security fundamentals for e-commerceLeave the NDL website. Information hiding techniques for steganography and digital watermarkingLeave the NDL website. Multicast and group securityLeave the NDL website. Computer forensics and privacyLeave the NDL website. Computer and intrusion forensicsLeave the NDL website. Privacy protection and computer forensicsLeave the NDL website. Java card for e-payment applicationsLeave the NDL website. Implementing electronic card payment systemsLeave the NDL website. Electronic payment systems for e-commerceLeave the NDL website. Developing secure distributed systems with CORBALeave the NDL website. Security in wireless LANs and MANsLeave the NDL website. Defense and detection strategies against Internet wormsLeave the NDL website. Role-based access controlsLeave the NDL website. Demystifying the IPsec puzzleLeave the NDL website. User's guide to cryptography and standardsLeave the NDL website. Techniques and applications of digital watermarking and content protectionLeave the NDL website. Contemporary cryptographyLeave the NDL website. Security technologies for the World Wide WebLeave the NDL website. The German Enigma cipher machine : beginnings, success, and ultimate failureLeave the NDL website. Internet and Intranet securityLeave the NDL website. Secure messaging with PGP and S/MIMELeave the NDL website. Non-repudiation in electronic commerceLeave the NDL website. Bluetooth securityLeave the NDL website.

Search by Bookstore

Holdings of Libraries in Japan

This page shows libraries in Japan other than the National Diet Library that hold the material.

Please contact your local library for information on how to use materials or whether it is possible to request materials from the holding libraries.

other

  • CiNii Research

    Search Service
    Paper
    You can check the holdings of institutions and databases with which CiNii Research is linked at the site of CiNii Research.

Bibliographic Record

You can check the details of this material, its authority (keywords that refer to materials on the same subject, author's name, etc.), etc.

Paper

Material Type
図書
Publication, Distribution, etc.
Place of Publication (Country Code)
us
Target Audience
一般
Related Material
Implementing security for ATM networks
Security fundamentals for e-commerce
Information hiding techniques for steganography and digital watermarking
Multicast and group security
Computer forensics and privacy
Computer and intrusion forensics
Privacy protection and computer forensics
Java card for e-payment applications
Implementing electronic card payment systems
Electronic payment systems for e-commerce
Developing secure distributed systems with CORBA
Security in wireless LANs and MANs
Defense and detection strategies against Internet worms
Role-based access controls
Demystifying the IPsec puzzle
User's guide to cryptography and standards
Techniques and applications of digital watermarking and content protection
Contemporary cryptography
Security technologies for the World Wide Web
The German Enigma cipher machine : beginnings, success, and ultimate failure
Internet and Intranet security
Secure messaging with PGP and S/MIME
Non-repudiation in electronic commerce
Bluetooth security
Data Provider (Database)
国立情報学研究所 : CiNii Research
Original Data Provider (Database)
CiNii Books
NCID
https://ci.nii.ac.jp/ncid/BA4571644X : BA4571644X