Spelling suggestions: "subject:"IT-sädatasäkerhet.""
11 |
Actual and perceived information systems security /Oscarson, Per, January 2007 (has links)
Diss. Linköping : Linköpings universitet, 2007.
|
12 |
Models, methodology and challenges within strategic information security for senior managements /Lindström, John, January 2009 (has links)
Diss. Luleå : Luleå tekniska universitet, 2009.
|
13 |
Towards measurable and tunable security /Lundin, Reine, January 2007 (has links)
Licentiatavhandling Karlstad : Karlstads universitet, 2007.
|
14 |
Security for IP multimedia applications over heterogeneous networks /Carrara, Elisabetta. January 2005 (has links)
Licentiatavhandling Stockholm : Tekniska högskolan, 2005.
|
15 |
Two topics in cryptography : lattice problems and the security of protocols /Trolin, Mårten, January 2005 (has links)
Lic.-avh. Stockholm : Tekn. högsk., 2005.
|
16 |
Discovering information security management /Björck, Fredrik, January 2005 (has links)
Diss. Stockholm : Stockholms universitet, 2005.
|
17 |
A dynamic and adaptive information security awareness (DAISA) approach /Casmir, Respickius, January 2005 (has links)
Diss. Stockholm : Stockholms universitet, 2005.
|
18 |
Usable security policies in runtime environments /Herzog, Almut, January 2007 (has links)
Diss. Linköping : Linköpings universitet, 2007.
|
19 |
Securing information assets : understanding, measuring and protecting against social engineering attacks /Nohlberg, Marcus, January 2008 (has links)
Diss. (sammanfattning) Stockholm : Stockholms universitet, 2009. / Härtill 7 uppsatser.
|
20 |
Towards secure SIP signalling service for VoIP applications : performance-related attacks and preventions /Zhang, Ge, January 2009 (has links)
Licentiatavhandling (sammanfattning) Karlstad : Karlstads universitet, 2009. / Härtill 4 uppsatser.
|
Page generated in 0.0389 seconds