Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
581
GUIDE TO FIREWALLS AND NETWORK SECURITY with intrusion detection and VPNs
Published 2004Subjects: “…Firewalls (Computer security)…”
Click Here to View Status and Holdings.
Book -
582
Mobile application security
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
583
Secure electronic commerce building the infrastructure for digital signatures and encryption
Published 1997Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
584
Security and privacy for e-business
Published 2001Subjects: Click Here to View Status and Holdings.
Unknown -
585
MSCE instructor resource manual (70-220) windows 2000 network security design
Published 2001Subjects: Click Here to View Status and Holdings.
Unknown -
586
Hacking exposed Windows 2000 network security secrets and solutions
Published 2001Subjects: Click Here to View Status and Holdings.
Unknown -
587
Cryptography and network security principles and practice
Published 1999Subjects: Click Here to View Status and Holdings.
Unknown -
588
Cryptography and network security principles and practice
Published 2003Subjects: Click Here to View Status and Holdings.
Book -
589
Cryptography for Internet and database applications developing secret and public key techniques with Java
Published 2002Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
590
Network security private communication in a public world
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
591
Information warfare in business strategies of control and resistance in the network society
Published 2004Subjects: Click Here to View Status and Holdings.
Unknown -
592
Hardening windows systems
Published 2004Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
593
Cryptography and network security principles and practices
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
594
Cryptography and network security principles and practices
Published 2006Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
595
Network security assessment from vulnerability to patch
Published 2007Subjects: Click Here to View Status and Holdings.
Unknown -
596
Information security management handbook
Published 2007Subjects: “…Computer security Handbooks, manuals, etc. Management…”
Click Here to View Status and Holdings.
Unknown -
597
Privacy protection for e-services
Published 2006Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
598
Secure computer and network systems modeling, analysis and design
Published 2008Subjects: Click Here to View Status and Holdings.
Unknown -
599
Introduction to identity-based encryption
Published 2008Subjects: “…Public key infrastructure (Computer security)…”
Click Here to View Status and Holdings.
Unknown -
600
Information security contemporary cases
Published 2007Subjects: “…Computer security Case studies Case studies…”
Click Here to View Status and Holdings.
Unknown