Related Books

Architectures and Protocols for Secure Information Technology Infrastructures
Language: en
Pages: 427
Authors: Ruiz-Martinez, Antonio
Categories: Computers
Type: BOOK - Published: 2013-09-30 - Publisher: IGI Global

GET EBOOK

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security
Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities
Language: en
Pages: 259
Authors: Ng, Alex Chi Keung
Categories: Computers
Type: BOOK - Published: 2018-01-26 - Publisher: IGI Global

GET EBOOK

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area.
Network Security Technologies: Design and Applications
Language: en
Pages: 348
Authors: Amine, Abdelmalek
Categories: Computers
Type: BOOK - Published: 2013-11-30 - Publisher: IGI Global

GET EBOOK

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have bee
Web Information Systems and Technologies
Language: en
Pages: 387
Authors: Valérie Monfort
Categories: Computers
Type: BOOK - Published: 2015-12-15 - Publisher: Springer

GET EBOOK

This book constitutes revised selected papers from the 10th International Conference on Web Information Systems and Technologies, WEBIST 2014, held in Barcelona
Security for Service Oriented Architectures
Language: en
Pages: 200
Authors: Walter Williams
Categories: Computers
Type: BOOK - Published: 2014-04-24 - Publisher: CRC Press

GET EBOOK

This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the de