Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
661
-
662
-
663
Techno security's guide to e-discovery and digital forensics
Published 2007Subjects: “…Computer security omputer networks Security measure…”
Click Here to View Status and Holdings.
Unknown -
664
-
665
CCSP cisco secure PIX firewall advanced exam certification guide
Published 2003Subjects: Click Here to View Status and Holdings.
Unknown -
666
Security management an introduction
Published 2005Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
667
Information security and ethics social and organizational issues
Published 2005Subjects: “…Computer security Moral and ethical aspects…”
Click Here to View Status and Holdings.
Unknown -
668
Computer safety, reliability, and security 26th international conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007 : proceedings
Published 2007Subjects: Click Here to View Status and Holdings.
Conference Proceeding -
669
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
Published 2009Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown -
670
IT security metrics a practical framework for measuring security & protecting data
Published 2010Subjects: “…Computer security Evaluation Evaluation…”
Click Here to View Status and Holdings.
Unknown -
671
Group policy fundamentals, security, and the managed desktop
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
672
Security strategy from requirements to reality
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
673
Security of mobile communications
Published 2010Subjects: Click Here to View Status and Holdings.
Unknown -
674
Privacy and data protection a comparative analysis with special reference to the Malaysian proposed law
Published 2002Subjects: “…Computer security Access control…”
Click Here to View Status and Holdings.
Unknown -
675
-
676
Information security a manager's guide to thwarting data thieves and hackers
Published 2008Subjects: Click Here to View Status and Holdings.
Unknown -
677
Security and policy driven computing
Published 2011Subjects: Click Here to View Status and Holdings.
Unknown -
678
Security Management A Critical Thinking Approach
Published 2014Subjects: Click Here to View Status and Holdings.
Book -
679
-
680
Dissecting the hack the forb1dd3n network
Published 2010Subjects: “…Computer security Security measures…”
Click Here to View Status and Holdings.
Unknown