Search Results - "Computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
121
Introduction to modern cryptography
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
122
Towards improved security management practice designing an organizational model procedure for the implementation of information security management in heterogeneous information man...
Published 2002Subjects: “…Computer security Management…”
Click Here to View Status and Holdings.
Unknown -
123
Maximum Linux security a hacker's guide to protecting your Linux server and workstation
Published 2000Subjects: Click Here to View Status and Holdings.
Unknown -
124
Introduction to modern cryptography
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
125
Understanding and applying cryptography and data security
Published 2009Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
126
Applied Oracle security developing secure database and middleware environments
Published 2010Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
127
Hacking exposed Linux Linux security secrets & solutions
Published 2008Subjects: Click Here to View Status and Holdings.
Unknown -
128
Cryptography engineering design principles and practical applications
Published 2010Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
129
Security 2020 reduce security risks this decade
Published 2011Subjects: “…Computer security Forecasting…”
Click Here to View Status and Holdings.
Unknown -
130
Network Security: A Hacker's Perspective
Published 2006Subjects: “…Computer Security…”
Click Here to View Status and Holdings.
Book -
131
Cryptography and security
Published 1992Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
132
Cryptography Engineering Design Principles and Practical Applications
Published 2010Subjects: Click Here to View Status and Holdings.
Manuscript Book -
133
-
134
Trojans, worms, and spyware a computer security professional's guide to malicious code
Published 2005Subjects: Click Here to View Status and Holdings.
Unknown -
135
Principles of computer security CompTIA security+ and beyond lab manual
Published 2011Subjects: “…Computer security Handbooks, manuals, etc Management…”
Click Here to View Status and Holdings.
Book Chapter -
136
Preventing Computer Fraud
Published 1993Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
137
Computers, ethics & social values
Published 1995Subjects: Click Here to View Status and Holdings.
Unknown -
138
Computer Crime A Crimefighter's Handbook
Published 1995Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Book -
139
The NCSA guide to enterprise security protecting information assets
Published 1996Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
140
Building a secure computer system
Published 1988Subjects: Click Here to View Status and Holdings.
Unknown