Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
241
Computer and communications security Strategies for the 1990s
Published 1989Subjects: Click Here to View Status and Holdings.
Unknown -
242
Security in computing
Published 1989Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
243
Applied cryptography protocols, algorithms, and source code in C
Published 1996Subjects: Click Here to View Status and Holdings.
Unknown -
244
Satellite encryption
Published 1999Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
245
Network security essentials applications and standards
Published 2000Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
246
Hacking exposed network security secrets & solutions
Published 2001Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
247
Hack attacks denied a complete guide to network lockdown
Published 2001Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
248
Securing Java getting down to business with mobile code
Published 1999Subjects: Click Here to View Status and Holdings.
Unknown -
249
Security in computing
Published 1997Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
250
Inside java 2 platform security architecture, API design, and implementation
Published 1999Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
251
Network security data and voice communications
Published 1996Subjects: Click Here to View Status and Holdings.
Unknown -
252
-
253
Secrets and lies digital security in a networked world
Published 2000Subjects: Click Here to View Status and Holdings.
Unknown -
254
-
255
Maximum Windows 2000 security
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
256
-
257
-
258
Malaysian public sector management of information & communications technology security handbook
Published 2002Subjects: “…Computer security handbooks, manuals, etc Malaysia…”
Click Here to View Status and Holdings.
Unknown -
259
Information hiding techniques for steganography and digital water making
Published 2000Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
260
Computer forensics and privacy
Published 2001Subjects: Click Here to View Status and Holdings.
Unknown