Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
541
Understanding PKI concepts, standards, and deployment considerations
Published 2003Subjects: “…Public key infrastructure (Computer security)…”
Click Here to View Status and Holdings.
Unknown -
542
CISSP certification training guide
Published 2003Subjects: “…aComputer security Examinations Study guides…”
Click Here to View Status and Holdings.
Unknown -
543
Principles and practice of information security protecting computers from hackers and lawyers
Published 2004Subjects: Click Here to View Status and Holdings.
Unknown -
544
Security in fixed and wireless networks an introduction to securing data communications
Published 2003Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
545
I love the Internet but I want my privacy, too!
Published 1998Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
546
Hardening apache
Published 2004Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
547
Information security management handbook
Published 2005Subjects: “…Computer security Handbooks, manuals, etc Management…”
Click Here to View Status and Holdings.
Unknown -
548
Linux firewalls Steve Suehring, Robert Ziegler
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
549
The security risk assessment handbook a complete guide for performing security risk assessments
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
550
Security and privacy in the age of ubiquitous computing IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan
Published 2005Subjects: “…Computer security Congresses…”
Click Here to View Status and Holdings.
Conference Proceeding -
551
Information security management handbook
Published 2003Subjects: Click Here to View Status and Holdings.
Unknown -
552
-
553
Information security management handbook
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
554
Secure programming with static analysis
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
555
Fuzzing brute force vulnerabilty discovery
Published 2007Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
556
Complete guide to CISM certification
Published 2007Subjects: “…Computer security Management Examinations Study guides…”
Click Here to View Status and Holdings.
Unknown -
557
Enterprise information systems assurance and system security managerial and technical issues
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
558
-
559
Practical embedded security building secure resource-constrained systems
Published 2008Subjects: Click Here to View Status and Holdings.
Unknown -
560
Security and embedded systems
Published 2006Subjects: “…Computer security Congresses Security measures…”
Click Here to View Status and Holdings.
Unknown