Page 1 from 5 hits

Sort by: Relevancy | Currentness | Title

  • «
  • 1
  1.  

    Developing Metrics for Effective Information Security Governance

    Pironti, John P. | Online Contents | 2007
  2.  

    Key Elements of a Threat and Vulnerability Management Program

    Pironti, John P. | Online Contents | 2006
  3.  

    Key Elements of an Information Security Program

    Pironti, John P. | Online Contents | 2005
  4.  

    An Implementation of TLS 1.2 with Verified Cryptographic Security

    Fournet, C. / Bhargavan, K. / Kohlweiss, M. et al. | British Library Conference Proceedings | 2013
    Contributors: Mitchell, John C.
  • «
  • 1

Number of results: 10 | 20 | 50