Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
361
The history of information security a comprehensive handbook
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
362
Security monitoring with Cisco security MARS
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
363
Security and software for cybercafes
Published 2008Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
364
Privacy-aware knowledge discovery novel applications and new techniques
Published 2011Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
365
Managing information security
Published 2010Subjects: “…Computer security Management…”
Click Here to View Status and Holdings.
Unknown -
366
The web application hacker's handbook finding and exploiting security flaws
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
367
-
368
Managing Risk in Information Systems
Published 2015Subjects: Click Here to View Status and Holdings.
Manuscript Book -
369
DIGITAL WATERMARKING IN MEDICAL IMAGES
Published 2014Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
370
Digital Forensics and Incident Response Incident response techniques and procedures to respond to modern cyber threats
Published 2020Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
371
Securing cloud and mobility a practitioner's guide
Published 2013Subjects: “…obile computing Cloud computing Security measure…”
Click Here to View Status and Holdings.
Unknown -
372
Computer auditing, security, and internal control manual
Published 1987Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
373
Handbook for information security a guide towards information security standards Part 1
Click Here to View Status and Holdings.
Unknown -
374
Handbook for information security a guide towards information security standards Part 2
Published 1985Subjects: Click Here to View Status and Holdings.
Unknown -
375
-
376
Designing network security
Published 1999Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
377
Network security a beginner's guide
Published 2001Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
378
Niser ICT security survey for Malaysia 2000/2001
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
379
NETWORK SECURITY ESSENTIALS Application and Standards
Published 2003Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Book -
380
Enterprise security the manager's defense guide
Published 2003Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown