Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
181
-
182
Low tech hacking street smarts for security professionals
Published 2012Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
183
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
Published 2013Subjects: “…Computer security…”
Click Here to View Status and Holdings.
eBook -
184
Information security fundamentals
Published 2014Subjects: Click Here to View Status and Holdings.
Unknown -
185
Computers under attack intruders, worms, and viruses
Published 1991Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
186
The role of context and the human dimension in the design of secure systems
Published 1993Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
187
-
188
The CIO's Guide to Information Security Incident Management
Published 2019Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
189
Cybersecurity Risk Management Mastering the Fundamentals using the NIST Cybersecurity Framework
Published 2022Subjects: “…Computer security Risk management…”
Click Here to View Status and Holdings.
Book -
190
A guide to kernel exploitation attacking the core
Published 2011Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
191
Real digital forensics computer security and incident response
Published 2005Subjects: Click Here to View Status and Holdings.
Unknown -
192
Securing the cloud cloud computer security techniques and tactics
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
193
Beginning cryptography with Java
Published 2005Subjects: “…Public key infrastructure (Computer security)…”
Click Here to View Status and Holdings.
Unknown -
194
Firewalls and VPNs principles and practices
Published 2006Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
195
Ninja hacking unconventional penetration testing tactics and techniques
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
196
Advances in cryptology--CRYPTO '88 proceedings
Published 1990Subjects: “…Computer security Congresses…”
Click Here to View Status and Holdings.
Unknown -
197
UNIX system security essentials
Published 1995Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
198
-
199
Practical UNIX security
Click Here to View Status and Holdings.
Unknown -
200
Information Systems Security Facing the information society of the 21st Century
Published 1996Subjects: Click Here to View Status and Holdings.
Book Chapter