Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
561
Information assurance dependability and security in networked systems
Published 2008Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
562
Information Security and Ethics Concepts, Methodologies, Tools and Applications
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
563
Computer fraud and countermeasures
Published 1979Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
564
Mechanics of user identification and authentication fundamentals of identity management
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
565
Professional Cocoa application security
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
566
Safety of computer architectures
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
567
Handbook of electronic security and digital forensics
Published 2010Subjects: “…Computer security Handbooks, manuals, etc…”
Click Here to View Status and Holdings.
Unknown -
568
Computer crime, investigation, and the law
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
569
Insider threats in cyber security
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
570
Web commerce security design and development
Published 2011Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Book -
571
Introduction to cryptography with open-source software
Published 2011Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
572
Secure and resilient software requirements, test cases, and testing methods
Published 2012Subjects: Click Here to View Status and Holdings.
Unknown -
573
Pragmatic security metrics
Published 2013Subjects: “…Computer security Standards Security measures…”
Click Here to View Status and Holdings.
Unknown -
574
Security for Service Oriented Architectures
Published 2014Subjects: Click Here to View Status and Holdings.
Unknown -
575
Information security management handbook
Published 2007Subjects: “…Computer security Handbooks, manuals, etc Management…”
Click Here to View Status and Holdings.
Unknown -
576
Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare
Published 2015Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
577
A STUDY ON BITTORRENT (PEER-TO-PEER) PERFORMANCE BANDWITH UTILIZATION AND CONTENT DISTRIBUTION
Published 2003Subjects: Click Here to View Status and Holdings.
Thesis Book -
578
OPERATOR HANDBOOK SEARCH. COPY. PASTE. L33T; RED TEAM + OSINT + BLUE TEAM
Published 2020Subjects: Click Here to View Status and Holdings.
Book -
579
Security Strategies in Windows Platforms and Applications
Published 2021Subjects: Click Here to View Status and Holdings.
Book -
580