Search Results - "computer security"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 626
- Security measures 331
- Computer networks 222
- Data protection 111
- Computer crimes 63
- Access control 42
- Cryptography 40
- Information technology 40
- Management 40
- Electronic data processing departments 39
- Computers 30
- Computer hackers 27
- Congresses 26
- Investigation 25
- Business enterprises 24
- Internet 24
- Firewalls (Computer security) 23
- Data encryption (Computer science) 21
- Privacy, Right of 21
- Operating systems (Computers) 18
- Electronic commerce 16
- Examinations 16
- Prevention 16
- Certification 15
- Electronic data processing personnel 14
- Computer software 12
- Data processing 12
- Cloud computing 11
- Computer Security 11
- Law and legislation 11
-
161
Gray hat hacking the ethical hacker's handbook
Published 2005Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
162
-
163
The art of intrusion the real stories behind the exploits of hackers, intruders & deceivers
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
164
Security patterns integrating security and systems engineering
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
165
Multimedia encryption and watermarking
Published 2005Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
166
-
167
The unofficial guide to ethical hacking
Published 2006Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
168
Information assurance for the enterprise a roadmap to information security
Published 2007Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
169
Information security architecture an integrated approach to security in the organization
Published 2006Subjects: Click Here to View Status and Holdings.
Unknown -
170
Computer forensics and cyber crime an introduction
Published 2004Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
171
Physical and logical security convergence powered by enterprise security management
Published 2007Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
172
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
173
IPTV security protecting high-value digital contents
Published 2008Subjects: Click Here to View Status and Holdings.
Unknown -
174
Protecting information from classical error correction to quantum cryptography
Published 2006Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
175
Gray hat hacking the ethical hacker's handbook
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
176
Data-driven block ciphers for fast telecommunication systems
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
177
Data protection and information lifecycle management
Published 2006Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
178
Gray hat hacking the ethical hacker's handbook
Published 2008Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
179
Cybercrime the transformation of crime in the information age
Published 2007Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown -
180
Hands on ethical hacking and network defense
Published 2011Subjects: “…Computer security…”
Click Here to View Status and Holdings.
Unknown