Search Results - "Computer security"

  1. 601

    Digital privacy theory, technologies, and practices

    Published 2008
    Subjects: “…Computer security Security measures…”
    Click Here to View Status and Holdings.
    Unknown
  2. 602
  3. 603
  4. 604
  5. 605

    Internet fraud casebook the World Wide Web of deceit

    Published 2010
    Subjects: “…Computer security Case studies…”
    Click Here to View Status and Holdings.
    Unknown
  6. 606
  7. 607

    Coding for penetration testers building better tools by Andress, Jason

    Published 2012
    Subjects: “…Penetration testing (Computer security) Security measures Testing…”
    Click Here to View Status and Holdings.
    Book
  8. 608

    CompTIA Security+ Study Guide by Dulaney, Emmett A

    Published 2011
    Subjects: “…Computer security Study guides Examinations…”
    Click Here to View Status and Holdings.
    Unknown
  9. 609
  10. 610
  11. 611

    PKI security solutions for the enterprise solving HIPPA, E-paper act, and other compliance issues by Raina, Kapil

    Published 2003
    Subjects: “…Public key infrastructure (Computer security)…”
    Click Here to View Status and Holdings.
    Unknown
  12. 612
  13. 613
  14. 614

    Hacker V Pakar Keselamatan Rangkaian - Norton Internet Security by PC Man

    Published 2003
    Subjects: “…Computer security Security measures…”
    Click Here to View Status and Holdings.
    Unknown
  15. 615
  16. 616
  17. 617

    CISO's guide to penetration testing a framework to plan, manage, and maximize benefits by Tiller, James S.

    Published 2012
    Subjects: “…Penetration testing (Computer security)…”
    Click Here to View Status and Holdings.
    Unknown
  18. 618

    Unauthorized access the crisis in online privacy and security by Sloan, Robert H.

    Published 2014
    Subjects: “…Computer security Moral and ethical aspects…”
    Click Here to View Status and Holdings.
    Unknown
  19. 619
  20. 620