Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
341
Building secure software how to avoid security problems the right way
Published 2002Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
342
Introduction to cryptography principles and applications
Published 2002Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
343
Information security proceedings on the ..., November 6 - 7, 1999
Published 1999Subjects: Click Here to View Status and Holdings.
Unknown -
344
Hack proofing Linux a guide to open source security
Published 2001Subjects: Click Here to View Status and Holdings.
Unknown -
345
Information security proceedings of the ...held December 20 - 21, 2000
Published 2000Subjects: Click Here to View Status and Holdings.
Unknown -
346
Recent advances in intrusion detection proceedings of the ... held on the 2-4 October 2000
Published 2000Subjects: Click Here to View Status and Holdings.
Unknown -
347
Security engineering a guide to building dependable distributed systems
Published 2001Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
348
Payment technologies for e-commerce
Published 2003Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
349
WIRELESS SECURITY models, threats, and solutions
Published 2002Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
350
Security planning & disaster recovery
Published 2002Subjects: “…Computer security Management…”
Click Here to View Status and Holdings.
Unknown -
351
Hiding in plain sight steganography and the art of covert communication
Published 2003Subjects: Click Here to View Status and Holdings.
Unknown -
352
Wireless security models, threats, and solutions
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
353
PDA security incorporating handhelds into the enterprise
Published 2003Subjects: Click Here to View Status and Holdings.
Unknown -
354
HACKING EXPOSED COMPUTER FORENSICS SECRETS & SOLUTIONS
Published 2005Subjects: Click Here to View Status and Holdings.
Book -
355
Linux patch management keeping linux systems up to date
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
356
Menentang spyware dan malware
Published 2004Subjects: Click Here to View Status and Holdings.
Unknown -
357
Applied cryptanalysis breaking ciphers in the real world
Published 2007Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
358
Introduction to cryptography principles and applications
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
359
Recent advances in intrusion detection 10th international symposium, RAID 2007, Gold Goast [i.e. Coast], Australia, September 5-7, 2007 : proceedings
Published 2007Subjects: “…Computer security Congresses…”
Click Here to View Status and Holdings.
Unknown -
360
Intelligent multimedia data hiding new directions
Published 2007Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown