Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
461
Trustworthy computing analytical and quantitative engineering evaluation
Published 2007Subjects: “…Computer security Reliability…”
Click Here to View Status and Holdings.
Unknown -
462
Trust and security in collaborative computing
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
463
Cryptanalysis of RSA and its variants
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
464
Mobile device security a comprehensive guide to securing your information in a moving world
Published 2010Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
465
Firewall design and analysis
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
466
Role mining in business taming role-based access control administration
Published 2012Subjects: Click Here to View Status and Holdings.
Unknown -
467
The basics of information security understanding the fundamentals of InfoSec in theory and practice
Published 2011Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
468
Scene of the Cybercrime: Computer Forensics Computer Forensics
Published 2015Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
469
The Basics of Information Security Understanding the Fundamentals of Infosec in Theory and Practice
Published 2014Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
470
Cyber crime, security and digital intelligence
Published 2013Subjects: Click Here to View Status and Holdings.
Unknown -
471
The basics of information security understanding the fundamentals of InfoSec in theory and practice
Published 2014Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
472
MANAGEMENT OF INFORMATION SECURITY
Published 2019Subjects: Click Here to View Status and Holdings.
Book -
473
IT Governance and Information Security Guides, Standards, and Frameworks
Published 2022Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
474
Security and protection in information systems proceedings of the Fourth IFIP TC 11 International Conference on Computer Security, IFIP/SEC ?86, Monte Carlo, Monaco, 2-4 December, 1986
Published 1989Subjects: “…Computer security Congresses…”
Click Here to View Status and Holdings.
Conference Proceeding -
475
Defensive Security Handbook Best Practices for Securing Infrastructure
Published 2017Subjects: Click Here to View Status and Holdings.
Book -
476
Disaster recovery planning for computers and communication resources
Published 1996Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
477
Handbook of information security management 1999
Published 1999Subjects: “…Computer security - Handbook, manuals, etc.…”
Click Here to View Status and Holdings.
Unknown -
478
Risky business protect your business from being stalked, conned, or blackmailed on the web
Published 1998Subjects: Click Here to View Status and Holdings.
Unknown -
479
Test yourself MCSE designing security for windows 2000 (exam 70-220)
Published 2001Subjects: “…Computer security Examinations Study guides…”
Click Here to View Status and Holdings.
Unknown -
480
Secure electronic commerce building the infrastructure for digital signatures and encryption
Published 2001Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown