Linked e-resources
Details
Table of Contents
Privacy
Software security and malware analysis
Network security and protocols
Access control models and policy analysis
Protocol verification
Cryptographic technologies.
Software security and malware analysis
Network security and protocols
Access control models and policy analysis
Protocol verification
Cryptographic technologies.