![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Encyclopedia of Information Assurance 2011
- Rebecca Herold:
Encyclopedia of Information Assurance. Taylor & Francis 2011, ISBN 1-4200-6620-X
A
- Stanley A. Kurzban:
Access Controls: Implementation. - Alex Golod:
Access Controls: PKI-Based. - Dean Bushmiller:
Accountability. - Robby Fussell:
Adaptable Protocol Framework. - Ben Rothke:
Advanced Encryption Standard (AES). - Al Berg:
Applets: Network Security. - Keith Pasley:
Application Layer Security. - William Stackpole:
Application Layer Security: Network Protocols. - Walter S. Kobus Jr.:
Application Security. - Sean Scanlon:
Application Security: World Wide Web. - Andres Llana Jr.:
Application Service Providers: Information Assurance Considerations. - Stephen D. Fried:
Application Service Providers: Secure Relationships. - Lowell Bruce McCulley:
Application Systems Development. - David C. Rice, Graham Bucholz:
Applications: Auditing. - Kenneth J. Knapp, R. Franklin Morris Jr.:
Architecture: Biological Cells. - Chris Hare:
Architecture: Firewalls. - Foster J. Henderson, Kellina M. Craig-Henderson:
Architecture: Models. - Christopher A. Pilewski, Bonnie A. Goins Pilewski:
Architecture: Secure. - Bryan D. Fish:
Artificial Intelligence (AI): Intrusion Analysis. - Mansour Sheikhan:
Artificial Neural Network Models for Intrusion Detection. - Steven F. Blanding:
Asynchronous Transfer Mode (ATM): Integrity and Security. - Stephen James:
Auditing: Self-Hacking. - Maria Schuett:
Authentication Methods. - Susan D. Hansche:
Awareness and Training. - Susan D. Hansche:
Awareness and Training: Appendices. - Timothy R. Stacey:
Awareness and Training: Briefing for the End User. - Rebecca Herold:
Awareness and Training: Effective Methods. - Charles R. Hudson Jr.:
Awareness and Training: Framework. - Samuel W. Chun:
Awareness and Training: Motivational and Psychological Factors. - Thomas R. Peltier:
Awareness and Training: Program Elements.
B
- Edward H. Freeman:
Bally v. Faber. - Donald R. Richards:
Biometrics: Identification. - Judith M. Myerson:
Biometrics: New Methods. - Mano Paul:
Bluesnarfing. - James Trulove:
Broadband Internet Access. - Sean M. Price:
Buffer Overflows: Attacks. - Jonathan Held:
Buffer Overflows: Stack-Based. - Ken Doughty:
Business Continuity Management: Maintenance Processes. - Carl B. Jackson:
Business Continuity Management: Metrics. - Kevin Henry:
Business Continuity Management: Priorities. - James S. Mitts:
Business Continuity Management: Testing. - Carl B. Jackson:
Business Continuity Management: Testing, Maintenance, Training, and Awareness. - Ken M. Shaurette, Thomas J. Schleppenbach:
Business Continuity Planning. - Timothy R. Stacey:
Business Continuity Planning: Best Practices and Program Maturity. - Kevin Henry:
Business Continuity Planning: Case Study. - Kevin Henry:
Business Continuity Planning: Collaborative Approach. - Steven P. Craig:
Business Continuity Planning: Distributed Environment. - Carl B. Jackson:
Business Continuity Planning: Enterprise Risk Management Structure. - Carl B. Jackson:
Business Continuity Planning: Evolution in Response to Major News Events. - Carl B. Jackson:
Business Continuity Planning: Process Reengineering. - John Dorf, Martin Johnson:
Business Continuity Planning: Restoration Component. - Ken Doughty:
Business Continuity Planning: Strategy Selection. - Carl B. Jackson:
Business Impact Analysis: Business Process Mapping. - Carl B. Jackson:
Business Impact Analysis: Process. - Jeff Misrahi:
Business Partnerships: Validation.
C
- Matt Nelson:
Capability Maturity Model. - Micki Krause:
Career Management. - William Stackpole:
Centralized Authentication Services. - Mollie E. Krehnke, David C. Krehnke:
Certification and Accreditation: Methodology. - Kevin J. Davidson:
Certification Testing. - Mansour Sheikhan:
Chaotic-Based Communication Systems. - Mignona Cote:
Committee of Sponsoring Organizations (COSO). - Ben Rothke:
Common Criteria. - Debra S. Herrmann:
Common Criteria: IT Security Evaluation. - William Hugh Murray:
Communication Protocols and Services. - Todd Fitzgerald:
Compliance Assurance. - Donn B. Parker:
Computer Abuse. - Christopher A. Pilewski:
Computer Crime. - George Wade:
Computer Crime: Investigations. - Leighton Johnson III:
Configuration Management. - Mollie E. Krehnke, David C. Krehnke:
Configuration Management: Process Stages. - Chris Hare:
Controls: CISSP and Common Body of Knowledge (CBK). - William T. Harding, Anita J. Reed, Robert L. Gray:
Cookies and Web Bugs. - David C. Krehnke:
Corporate Governance. - Jeffrey Davis:
Corporate Security: IT Organization. - Anton Chuvakin:
Covert Channels. - Ralph Spencer Poore:
Covert Channels: Analysis and Recommendations. - Mollie E. Krehnke:
Crime Prevention: Environmental Design. - Bonnie A. Goins Pilewski:
Critical Business Functions. - Jonathan Held:
Cross-Site Scripting (XSS). - Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. - Javek Ikbal:
Cryptography. - Steve Stanek:
Cryptography: Auditing. - Joost Houwen:
Cryptography: Cryptosystems. - Paul Lambert:
Cryptography: Elliptic Curve. - Ronald A. Gove:
Cryptography: Encryption and. - William Hugh Murray:
Cryptography: Key Management: Functions and Principles. - Ralph Spencer Poore:
Cryptography: Key Management: History and Myths. - Ben Rothke:
Cryptography: Quantum. - Ralph Spencer Poore:
Cryptography: Transitions. - Chris Hare:
Customer Relationship Management (CRM). - Ed Gabrys:
Cybercrime: Council of Europe. - Thomas Akin:
Cybercrime: Response, Investigation, and Prosecution. - Carol A. Siegel, Ty R. Sagalow, Paul Serritella:
Cyber-Risk Management: Enterprise-Level Security.
D
- Mollie E. Krehnke, David C. Krehnke:
Data Access Controls: Sensitive or Critical. - Samuel W. Chun, Leo Kahng:
Data at Rest. - John R. Vacca:
Data Centers: Security. - Sandy Bacik:
Data Centers: Site Selection and Facility Design. - Jonathan Held:
Data Sanitization: SQL Injection. - Mollie E. Krehnke, D. K. Bradley:
Data Warehouses: Datamarts and. - David Bonewell, Karen Gibbs, Adriaan Veldhuisen:
Data Warehouses: Security and Privacy. - William Hugh Murray:
Database Integrity. - Jeffrey Davis:
Defense in Depth: Network, Systems, and Applications Controls. - K. Narayanaswamy:
Denial-of-Service Attacks. - Marcus Rogers:
Digital Crime Scene Analysis (DCSA). - Larry R. Leibrock:
Digital Forensics and E-Discovery. - Ken Buszta:
Directory Security. - Sasan Hamidi:
Distributed Computing: Grid Environment. - Robert B. Batie Jr.:
DoD Information Assurance Certification and Accreditation Process (DIACAP). - Mark Bell:
Domain Name Service (DNS) Attacks. - Thomas J. Bray:
Downsizing: Maintaining Information Security. - Robert Braun, Stan Stahl:
Due Care: Minimum Security Standards.
E
- Chris Hare:
Electronic Commerce: Auditing. - Leo A. Wrobel:
E-Mail and Data Communications: Dial-In Hazards. - William Stallings:
E-Mail: Pretty Good Privacy. - Stephen D. Fried:
E-Mail Retention Policy: Legal Requirements. - Bruce A. Lobree:
E-Mail: Security. - Al Bredenberg:
E-Mail: Spam. - Bryan T. Koch:
Enclaves: Enterprise as Extranet. - Franjo Majstor, Guy Vancollie:
Encryption Key Management. - Franjo Majstor:
End Node Security and Network Access Management. - Bonnie A. Goins Pilewski:
Enterprise Information Assurance: Framework. - Duane E. Sharp:
Enterprise Information Assurance: Key Components. - Mollie E. Krehnke, David C. Krehnke:
Enterprise Information Security: Architectural Design and Deployment. - Matthew J. Decker:
Enterprise Security Capability: Common Models. - Matunda Nyanchama, Anna Wilson:
Enterprise Security Information. - Craig A. Schiller:
Espionage: Counter-Economic. - Peter S. Tippett:
Ethics. - Micki Krause:
Ethics: Internet. - Glenn Cater:
Event Management. - Steven F. Blanding:
External Networks: Secured Connections. - Christopher King:
Extranet Access Control.
F
- Ben Rothke:
Fax Machines. - Paul A. Henry:
Firewall Architectures. - Paul A. Henry:
Firewall Architectures: Other Issues. - Paul A. Henry:
Firewall Architectures: Platforms. - Paul A. Henry:
Firewall Architectures: Viruses and Worms. - Per Thorsheim:
Firewall Technologies: Comparison. - Ben Rothke:
Firewalls: Checkpoint Security Review. - E. Eugene Schultz:
Firewalls: Internet Security. - Kelly J. Kuchta:
Forensics. - Thomas Welch:
Forensics and Legal Proceedings. - Thomas Welch:
Forensics: Computer Crime Investigation. - Carol Stucki:
Forensics: Non-Liturgical Examinations. - Michael J. Corby:
Forensics: Operational. - Thomas Welch:
Forensics: Rules of Evidence. - Mano Paul:
Format String Vulnerabilities. - Rebecca Herold:
Fraud: Employee Identification. - Chris Hare:
FTP: Secured Data Transfers. - Mansour Sheikhan:
Fuzzy Models for Intrusion Detection.
G
- Ralph Spencer Poore:
Global Transmissions: Jurisdictional Issues. - Glossary.
H
- Ed Skoudis:
Hackers: Attacks and Defenses. - Ed Skoudis:
Hackers: Hiring Ex-Criminal. - Ed Skoudis:
Hackers: Tools and Techniques. - Chris Hare:
Halon Fire Suppression Systems. - Keith Pasley:
Hash Algorithms. - Lynda L. McGhie:
Health Insurance Portability and Accountability Act (HIPAA). - Todd Fitzgerald:
Health Insurance Portability and Accountability Act (HIPAA): Requirements. - David MacLeod, Brian T. Geffert, David Deckter:
Health Insurance Portability and Accountability Act (HIPAA): Security Readiness. - Brian T. Geffert:
Health Insurance Portability and Accountability Act (HIPAA): Security Requirements. - Micki Krause:
Healthcare Industry. - William C. Boni:
High-Tech Trade Secrets. - Anton Chuvakin:
Honeypots and Honeynets. - Jeffery J. Lowder:
Host-Based Firewalls: Case Study. - Jeffrey H. Fenton, James M. Wolfe:
Human Resources: Issues.
I
- Lynda L. McGhie:
Identity Management. - Kevin Castellow:
Identity Management Systems: Components. - James S. Tiller:
Identity Theft. - Samuel W. Chun:
Identity-Based Self-Defending Network: 5W Network. - Marcus Rogers:
Incident Response: Evidence Handling. - Ken M. Shaurette, Thomas J. Schleppenbach:
Incident Response: Exercises. - Alan B. Sterneckert:
Incident Response: Management. - Michael Vangelos:
Incident Response: Managing. - Rebecca Herold:
Incident Response: Privacy Breaches. - Jim Appleyard:
Information Classification. - Sean M. Price:
Information Flow. - Sean M. Price:
Information Flow: Emerging and Potential Techniques and Covert Channels. - Sean M. Price:
Information Flow: Selecting Countermeasures. - Rebecca Herold:
Information Protection. - Ken M. Shaurette:
Information Security Basics: Effective Practices. - Harold F. Tipton:
Information Security Controls: Types. - Ralph Spencer Poore:
Information Security Governance: Basic Corporate Organization. - Todd Fitzgerald:
Information Security Governance: Corporate Organization, Frameworks, and Reporting. - Harold F. Tipton:
Information Security Management: Purpose. - Tom Carlson:
Information Security Management Systems (ISMSs). - Nick Halvorson:
Information Security Management Systems (ISMSs): Risk Diagnosis and Treatment. - Brian Shorten:
Information Security Policies. - Robert B. Batie Jr.:
Information Systems Security Engineering Professional (ISSEP). - Carl Burney:
Information Systems Security Officer: Roles and Responsibilities. - David McPhee:
Information Technology Infrastructure Library (ITIL®). - Gerald L. Kovacich:
Information Warfare. - Gerald L. Kovacich, Andy Jones, Perry G. Luzwick:
Information Warfare: Tactics. - Todd Fitzgerald:
Insider Threats. - Sean M. Price:
Insider Threats: System and Application Weaknesses. - Anderson Ramos:
Inspection Technologies: Deep Packets. - William Hugh Murray:
Instant Messaging. - George G. McBride:
Integrated Threat Management. - Robby Fussell:
Intelligent Agents: Network Security. - Michael Losavio, Adel Elmaghraby, Deborah W. Keeling:
International Issues. - Ron Moritz:
Internet Mobile Code. - Douglas G. Conorich:
Internet Security. - Lee Imrey:
Internet Service Providers (ISPs): Accountability. - Ralph L. Kliem:
Intranets: Risk. - Ken M. Shaurette:
Intrusion Detection Systems (IDSs). - E. Eugene Schultz, Eugene H. Spafford:
Intrusion Detection Systems (IDSs): Implementation. - Gildas A. Deograt-Lumy, Ray Haldo:
Intrusion Prevention Systems. - William Stackpole:
IP Security Protocol Working Group (IPSec). - Gilbert Held:
IPv6: Expanding Internet Support. - Scott Erkonen:
ISO Standards and Certification. - Mollie E. Krehnke:
IT Governance Institute (ITGI).
J
- Ben Rothke:
Java.
K
- Joe Kovara, Ray Kaplan:
Kerberos™. - Joe Kovara, Ray Kaplan:
Kerberos™: Management. - Joe Kovara, Ray Kaplan:
Kerberos™: Ongoing Development. - Joe Kovara, Ray Kaplan:
Kerberos™: Services and Functions.
L
- Steven F. Blanding:
LAN/WAN Security. - Faith M. Heikkila:
Laws and Regulations: e-Discovery.
M
- Ralph Hoefelmeyer, Theresa E. Phillips:
Malicious Code. - Paul A. Henry:
Malicious Code: Fast-Scanning Worms. - Michael Pike:
Malicious Code: Organized Crime. - Craig A. Schiller:
Malicious Code: Quasi-Intelligence. - E. Eugene Schultz:
Malicious Code: Rootkits. - James S. Tiller:
Managed Security Service Providers (MSSPs). - William Tompkins:
Management Commitment. - Todd Fitzgerald:
Management Commitment: Security Councils. - Sanford Sherizen:
Management Compliance: Confidential Information. - Kenneth J. Knapp, Thomas E. Marshall:
Management Support of IT: Survey. - Mano Paul:
Mashups and Composite Applications. - Craig A. Schiller:
Mergers and Acquisitions. - Ralph Spencer Poore:
Message Digests. - George G. McBride:
Mobile Data Security.
N
- Bonnie A. Goins Pilewski, Christopher A. Pilewski:
NERC Corporation: Compliance. - Samuel W. Chun:
Network and Telecommunications: Media. - Georges J. Jahchan:
Network Content Filtering and Leak Prevention. - Steven F. Blanding:
Network Layer Security. - Steven F. Blanding:
Network Router Security. - Bonnie A. Goins Pilewski, Christopher A. Pilewski:
Network Security. - Jeff Flynn:
Network Security: Trapping Intruders. - Chris Hare:
Network Technologies. - Sean M. Price:
Neural Networks and Information Assurance Uses. - Robby Fussell:
Next-Generation Security Application Development.
O
- Polly Perryman Kuver:
Object-Based Applications: Testing. - James Cannady:
Object-Oriented Databases: Security Models. - Louis B. Fried:
Object-Oriented Programming. - Stephen D. Fried:
Offshore Development. - Ed Skoudis:
Open Source. - David O'Berry:
Open Standards. - Michael Pike:
Operations Security: Abuses. - Patricia A. P. Fisher:
Operations Security: Controls. - Kevin Henry:
Operations Security: Support and Control. - Don Saracco:
Organization Culture. - Michael J. Corby:
Outsourcing. - William Hugh Murray:
Ownership and Custody of Data.
P
- Steve A. Rodgers:
Packet Sniffers. - Daniel D. Houser:
Passwords and Policy Threat Analysis. - Lynda L. McGhie:
Patch Management. - Felicia M. Nicastro:
Patch Management: Process. - William A. Yarberry Jr.:
PBX Firewalls. - Chuck Bianco:
Penetration Testing. - Stephen D. Fried:
Penetration Testing: Policies. - Satnam Purewal:
PeopleSoft Security. - R. Scott McCoy:
Perimeter Security. - John O. Wylder:
Personal Accountability: Corporate Information Security Policy. - Edward H. Freeman:
Personnel: Practices. - Kevin Henry:
Personnel: Security Roles. - Ben Rothke:
Personnel: Security Screening. - Todd Fitzgerald:
Phishing. - Dan M. Bowers:
Physical Access Control. - Matthew J. Decker:
Physical Layer Security: Networks. - James Trulove:
Physical Layer Security: Wired and Wireless Connections. - Christopher Steinke:
Physical Security. - Bruce R. Matthews:
Physical Security: Controlled Access and Layered Defense. - Alan Brusewitz:
Physical Security: Facilities. - R. Scott McCoy:
Physical Security: Mantraps and Turnstiles. - Kevin Henry:
Physical Security: Melding with Information Systems Security. - Gerald Bowman:
Physical Security: Mission-Critical Facilities and Data Centers. - Jaymes Williams:
Physical Security: Threat after September 11th, 2001. - Samantha Thomas:
Planning for the Future: Challenges. - Ben Rothke:
Pod Slurping: Concepts. - Kenneth F. Belva:
Pod-Slurping: Other Vulnerabilities. - Chris Hare:
Policy Development: Needs. - Phillip Q. Maier:
Portable Computing Environments. - Rebecca Herold:
Privacy Breaches: Policies, Procedures, and Notification. - Rebecca Herold:
Privacy Governance: Effective Methods. - Kate Borten:
Privacy: Healthcare Industry. - Edward H. Freeman:
Privacy: Legal Issues. - Michael J. Corby:
Privacy: Policy Formation. - Micah Silverman:
Proxy Servers. - Geoffrey C. Grabow:
Public Key Hierarchy. - Harry B. DeMaio:
Public Key Infrastructure (PKI). - Douglas C. Merrill, Eran Feigenbaum:
Public Key Infrastructure (PKI): E-Business. - Alex Golod:
Public Key Infrastructure (PKI): Registration.
Q
- Robby Fussell:
Quantum Computing.
R
- Ben Rothke:
Radio Frequency Identification (RFID). - Chris Hare:
RADIUS: Access Control. - Maria Schuett:
Reduced Sign-On. - Tyson Heyn:
Redundant Arrays of Independent Disks (RAID). - Ravi S. Sandhu:
Relational Database Access Controls: SQL. - Ravi S. Sandhu, Sushil Jojodia:
Relational Database Security. - Christina M. Bird:
Remote Access: Secure. - Carl F. Endorf:
Return on Investment (ROI). - Will Ozier:
Risk Analysis and Assessment: Risk Assessment Tasks. - Will Ozier:
Risk Analysis and Assessment: Risk Management Tasks. - Will Ozier:
Risk Analysis and Assessment: Terms and Definitions. - Samantha Thomas:
Risk Assessment. - Ron Woerner:
Risk Management. - Kevin Henry:
Risk Management and Analysis. - Carl B. Jackson, Mark Carey:
Risk Management: Enterprise. - Ken M. Shaurette:
Risk Management Model: Technology Convergence. - Brett Regan Young:
Risk Management: Trends. - Ian Clark:
Role-Based Access Control.
S
- Ken M. Shaurette:
Sarbanes-Oxley Act of 2002 (SOX). - Bonnie A. Goins Pilewski:
Sarbanes-Oxley Act of 2002 (SOX): Compliance. - Chris Hare:
Secure Socket Layer (SSL). - James S. Tiller:
Security Breaches: Reporting. - Alan Berman, Jeffrey L. Ott:
Security Controls: Dial-Up. - Kevin Henry:
Security Development Lifecycle. - Leighton Johnson III:
Security Incident Response. - E. Eugene Schultz:
Security Information and Event Management (SIEM). - Sasan Hamidi:
Security Information Management: Myths and Facts. - Derek Schatz:
Security Management Program: Prioritization. - Ken Buszta:
Security Management Team Organization. - Todd Fitzgerald:
Security Policy Development and Distribution: Web-Based. - Patrick D. Howard:
Security Policy Lifecycle: Functions and Responsibilities. - Mike Buglewicz:
Security Risk: Goals Assessment. - Lynda L. McGhie:
Security Teams: Effective Methods. - Sean M. Price:
Security Test and Evaluation. - Jon David:
Server Security Policies. - Gilbert Held:
Service Level Agreements. - Glenn Cater:
Service Oriented Architecture (SOA). - Chris Hare:
Simple Network Management Protocol (SNMP). - Ross A. Leo:
Single Sign-On: Enterprise. - James S. Tiller:
Smartcards. - Marcus Rogers:
Social Engineering: Mitigation. - George G. McBride:
Software Development Lifecycles: Security Assessments. - Roxanne E. Burkey:
Software Piracy. - Ed Skoudis:
Sploits. - Gilbert Held:
Spoofing and Denial of Service Attacks. - Ken M. Shaurette, Thomas J. Schleppenbach:
Spyware. - Janice C. Sipior, Burke T. Ward, Georgina R. Roselli:
Spyware: Ethical and Legal Concerns. - Bonnie A. Goins Pilewski:
Standards. - Edward H. Freeman:
State of Washington v. Heckel. - Mark Edmead:
Steganography. - Sasan Hamidi:
Steganography: Detection. - Franjo Majstor:
Storage Area Networks. - David A. Litzau:
Surveillance: Closed-Circuit Television and Video. - William Hugh Murray:
System Design Flaws. - Ian Lim, Ioana V. Bazavan:
System Development Security: Methodology. - Sureerut Inmor, Vatcharaporn Esichaikul, Dencho N. Batanov:
Systems Development: Object-Oriented Security Model. - Don Evans:
Systems Integrity Engineering: Distributed Processing Concepts and Corresponding Security-Relevant Issues. - Don Evans:
Systems Integrity Engineering: Interoperable Risk Accountability Concepts. - Don Evans:
Systems Integrity Engineering: Methodology and Motivational Business Values and Issues. - William Stackpole, Man Nguyen:
Systems Management: Third-Party Applications and Systems.
T
- Sandy Bacik:
Tape Backups: Validation. - Felicia M. Nicastro:
Technology Convergence: People, Process and Technology. - Louis B. Fried:
Technology Convergence: Security. - William A. Yarberry Jr.:
Telephony Systems: Auditing. - Paul A. Henry:
Tokens: Authentication. - Joseph T. Hootman:
Tokens: Evaluation. - Jeffrey Davis:
Tokens: Role and Authentication. - R. Scott McCoy:
Transformation: Department-Level. - Chris Hare:
Transport Layer Security (TLS).
U
- Ed Skoudis:
Uniform Resource Locators (URLs): Obscuring. - Jeffery J. Lowder:
UNIX Security.
V
- Chris Hare:
Virtual Network Computing (VNC) Systems. - James S. Tiller:
Virtual Private Networks (VPNs). - Keith Pasley:
Virtual Private Networks (VPNs): Deployment and Evaluation Strategy. - James S. Tiller:
Virtual Private Networks (VPNs): Leverage. - Keith Pasley:
Virtual Private Networks (VPNs): Perspectives. - John R. Vacca:
Virtual Private Networks (VPNs): Remote Access. - Marcus Rogers, Sean C. Leshney:
Virtualization and Digital Investigations. - Valene Skerpac:
Voice Communications: Voice-over-Internet (VoI). - Anthony Bruno:
Voice Communications: Voice-over-IP (VoIP) Protocols. - George G. McBride:
Voice Communications: Voice-over-IP (VoIP) Security. - Bill Lipiczky:
Voice over WLAN. - Chris Hare:
Voice Security.
W
- Georges J. Jahchan:
Web Applications: Firewalls. - Mandy Andress:
Web Applications: Security. - Lynda L. McGhie:
Web Services. - Dennis Seymour Lee:
Wireless Internet Security: Portable Internet Devices. - Franjo Majstor:
Wireless Local Area Networks (WLANs). - Frandinata Halim, Gildas A. Deograt-Lumy:
Wireless Local Area Networks (WLANs): Challenges. - Franjo Majstor:
Wireless Local Area Networks (WLANs): Security. - Gilbert Held:
Wireless Local Area Networks (WLANs): Vulnerabilities. - Christopher A. Pilewski:
Wireless Penetration Testing. - George Richards:
Workplace Violence. - Lynda L. McGhie, Phillip Q. Maier:
World Wide Web.
X
- Samuel C. McClintock:
Xml. - William Hugh Murray:
XML and Other Metadata Languages.
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.