Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
601
Digital privacy theory, technologies, and practices
Published 2008Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
602
Cyber law and cyber security in developing and emerging economies
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
603
Virtualization and forensics a digital forensic investigator's guide to virtual environments
Published 2010Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
604
Web application obfuscation '-/WAFs..Evasion..Filters//alert (/Obfuscation/)-'
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
605
Internet fraud casebook the World Wide Web of deceit
Published 2010Subjects: “…Computer security Case studies…”
Click Here to View Status and Holdings.
Unknown -
606
Hacking exposed web applications : web application security secrets and solutions
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
607
Coding for penetration testers building better tools
Published 2012Subjects: “…Penetration testing (Computer security) Security measures Testing…”
Click Here to View Status and Holdings.
Book -
608
CompTIA Security+ Study Guide
Published 2011Subjects: “…Computer security Study guides Examinations…”
Click Here to View Status and Holdings.
Unknown -
609
E-policy how to develop computer, E-mail, and Internet guidelines to protect your company and its assets
Published 1999Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
610
Digital signatures Mohan Atreya ... [et. al]
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
611
PKI security solutions for the enterprise solving HIPPA, E-paper act, and other compliance issues
Published 2003Subjects: “…Public key infrastructure (Computer security)…”
Click Here to View Status and Holdings.
Unknown -
612
Hacker's challenge 2 test your network security and forensic skills
Published 2003Subjects: Click Here to View Status and Holdings.
Unknown -
613
SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS
Published 2003Subjects: Click Here to View Status and Holdings.
Book -
614
Hacker V Pakar Keselamatan Rangkaian - Norton Internet Security
Published 2003Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
615
Seven deadliest wireless technologies attacks
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
616
Privacy and anonymity in information management systems new techniques for new practical problems
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
617
CISO's guide to penetration testing a framework to plan, manage, and maximize benefits
Published 2012Subjects: “…Penetration testing (Computer security)…”
Click Here to View Status and Holdings.
Unknown -
618
Unauthorized access the crisis in online privacy and security
Published 2014Subjects: “…Computer security Moral and ethical aspects…”
Click Here to View Status and Holdings.
Unknown -
619
Al-sirriyah al-ma'lumatiyyah dawabituha wa-ahkamuha al-shar'iyah
Published 2008Subjects: Click Here to View Status and Holdings.
Unknown -
620
Security without obscurity a guide to confidentiality, authentication, and integrity
Published 2014Subjects: Click Here to View Status and Holdings.
Unknown