Main
Information Security Policies and Actions in Modern Integrated Systems
You may be interested in Powered by Rec2Me
|
|
|
|
Most frequently terms
security700
group inc685
data580
key494
access442
web394
copyright347
systems342
prohibited340
application289
card288
certificate287
based268
xml268
smart261
user252
services236
applications228
content224
algorithm223
encryption221
secure204
document202
digital202
smart card184
model184
example181
public175
subject167
policy162
users161
policies160
reputation152
rules152
privacy149
management149
value141
server132
algorithms131
certificates131
cards130
element130
multimedia130
code128
http125
distributed115
You can write a book review and share your experiences. Other readers will always be interested in your opinion of the books you've read. Whether you've loved the book or not, if you give your honest and detailed thoughts then people will find new books that are right for them.