Search Results - "Computer security"

  1. 181

    Digital signatures by Katz, Jonathan

    Published 2010
    Subjects:
    Click Here to View Status and Holdings.
    Unknown
  2. 182

    Low tech hacking street smarts for security professionals

    Published 2012
    Subjects: “…Computer security…”
    Click Here to View Status and Holdings.
    Unknown
  3. 183
  4. 184
  5. 185

    Computers under attack intruders, worms, and viruses

    Published 1991
    Subjects: “…Computer security…”
    Click Here to View Status and Holdings.
    Unknown
  6. 186
  7. 187
  8. 188
  9. 189
  10. 190

    A guide to kernel exploitation attacking the core by Perla, Enrico

    Published 2011
    Subjects: “…Computer security…”
    Click Here to View Status and Holdings.
    Unknown
  11. 191
  12. 192
  13. 193

    Beginning cryptography with Java by Hook, David 1962-

    Published 2005
    Subjects: “…Public key infrastructure (Computer security)…”
    Click Here to View Status and Holdings.
    Unknown
  14. 194

    Firewalls and VPNs principles and practices by Tibbs, Richard W.

    Published 2006
    Subjects: “…Computer security…”
    Click Here to View Status and Holdings.
    Unknown
  15. 195
  16. 196

    Advances in cryptology--CRYPTO '88 proceedings

    Published 1990
    Subjects: “…Computer security Congresses…”
    Click Here to View Status and Holdings.
    Unknown
  17. 197

    UNIX system security essentials by Braun, Christoph 1956-

    Published 1995
    Subjects: “…Computer security…”
    Click Here to View Status and Holdings.
    Unknown
  18. 198
  19. 199

    Practical UNIX security by Garfinkel, Simson

    Subjects: “…Computer security…”
    Click Here to View Status and Holdings.
    Unknown
  20. 200