Chris Hare

According to our database1, Chris Hare authored at least 25 papers between 2007 and 2011.

Collaborative distances:
  • no known Dijkstra number2.
  • no known Erdős number3.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Voice Security.
Proceedings of the Encyclopedia of Information Assurance, 2011

Virtual Network Computing (VNC) Systems.
Proceedings of the Encyclopedia of Information Assurance, 2011

Transport Layer Security (TLS).
Proceedings of the Encyclopedia of Information Assurance, 2011

Simple Network Management Protocol (SNMP).
Proceedings of the Encyclopedia of Information Assurance, 2011

Secure Socket Layer (SSL).
Proceedings of the Encyclopedia of Information Assurance, 2011

RADIUS: Access Control.
Proceedings of the Encyclopedia of Information Assurance, 2011

Policy Development: Needs.
Proceedings of the Encyclopedia of Information Assurance, 2011

Network Technologies.
Proceedings of the Encyclopedia of Information Assurance, 2011

Halon Fire Suppression Systems.
Proceedings of the Encyclopedia of Information Assurance, 2011

FTP: Secured Data Transfers.
Proceedings of the Encyclopedia of Information Assurance, 2011

Electronic Commerce: Auditing.
Proceedings of the Encyclopedia of Information Assurance, 2011

Customer Relationship Management (CRM).
Proceedings of the Encyclopedia of Information Assurance, 2011

Controls: CISSP and Common Body of Knowledge (CBK).
Proceedings of the Encyclopedia of Information Assurance, 2011

Architecture: Firewalls.
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
Potential Cyber Terrorist Attacks.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Auditing the Electronic Commerce Environment.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Voice Security.
Proceedings of the Information security management handbook, Sixth Edition., 2007

What's Not So Simple about SNMP?
Proceedings of the Information security management handbook, Sixth Edition., 2007

Security and Network Technologies.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Understanding SSL.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Putting Security in the Transport.
Proceedings of the Information security management handbook, Sixth Edition., 2007

The Reality of Virtual Computing.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Controlling FTP.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Policy Development.
Proceedings of the Information security management handbook, Sixth Edition., 2007

It Is All about Control.
Proceedings of the Information security management handbook, Sixth Edition., 2007


  Loading...