Search Results - "computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
141
Information security
Published 1993Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
142
Tangled web tales of digital crime from the shadows of cyberspace
Published 2000Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
143
Cyberpunk outlaw and hackers on the computer frontier
Published 1991Subjects: Click Here to View Status and Holdings.
Unknown -
144
Vax security protecting the system and the data
Published 1991Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
145
-
146
Security architecture design, development and operations
Published 2001Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
147
Building an information security awareness program
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
148
Information assurance surviving in the information environment
Published 2001Subjects: Click Here to View Status and Holdings.
Unknown -
149
Hackers beware
Published 2002Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
150
Information security policies and procedures a practitioner's reference
Published 1999Subjects: Click Here to View Status and Holdings.
Unknown -
151
A practical guide to security engineering and information assurance
Published 2002Subjects: Click Here to View Status and Holdings.
Unknown -
152
-
153
Information security architecture an integrated approach to security in the organization
Published 2001Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
154
Multimedia data hiding
Published 2003Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
155
The secure online business e-commerce, IT functionality & business continuity
Published 2003Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
156
Mission-critical security planner when hackers won't take no for an answer
Published 2003Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
157
Hack attacks testing how to conduct your own security audit
Published 2003Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
158
Information security policies and actions in modern integrated systems
Published 2004Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
159
Information security fundamentals
Published 2005Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
160
Information security policies and procedures a practitioner's reference
Published 2004Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown