Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Computer Security
- Computer security 183
- Security measures 83
- Computer networks 60
- Data protection 19
- Computer crimes 15
- Internet 14
- Access control 10
- Information technology 9
- Hackers 8
- Prevention 8
- Investigation 7
- Data encryption (Computer science) 6
- Data processing 6
- Business enterprises 5
- Computer science 5
- Computers 5
- Electronic Data Processing 5
- Hacking 5
- Cloud computing 4
- Cryptography 4
- Law and legislation 4
- Medical informatics 4
- Operating systems (Computers) 4
- Python (Computer program language) 4
- operating systems 4
- Computer Communication Networks 3
- Computer software 3
- Corporations 3
- Cyberterrorism 3
-
1
Technology and privacy : the new landscape
Published 1997Full text (MFA users only)
Electronic eBook -
2
-
3
Security technologies for the World Wide Web
Published 2003Full text (MFA users only)
Electronic eBook -
4
Cybersecurity today and tomorrow : pay now or pay later
Published 2002Full text (MFA users only)
Electronic eBook -
5
Techniques and applications of digital watermarking and content protection
Published 2003Full text (MFA users only)
Electronic eBook -
6
-
7
-
8
Protecting your library's digital sources : the essential guide to planning and preservation
Published 2004Full text (MFA users only)
Electronic eBook -
9
Cyber adversary characterization : auditing the hacker mind
Published 2004Full text (MFA users only)
Electronic eBook -
10
Privacy protection and computer forensics
Published 2004Full text (MFA users only)
Electronic eBook -
11
-
12
Hacking a terror network : the silent threat of covert channels
Published 2005Full text (MFA users only)
Electronic eBook -
13
Linux on IBM e-server zSeries and S/390 best security practices
Published 2004Full text (MFA users only)
Electronic eBook -
14
-
15
Securing IM and P2P applications for the enterprise
Published 2006Full text (MFA users only)
Electronic eBook -
16
Innocent code : a security wake-up call for Web programmers
Published 2004Full text (MFA users only)
Electronic eBook -
17
-
18
Intrusion prevention and active response : deploying network and host IPS
Published 2005Full text (MFA users only)
Electronic eBook -
19
Basics of contemporary cryptography for IT practitioners
Published 2005Full text (MFA users only)
Electronic eBook -
20
Reversing : secrets of reverse engineering
Published 2005Full text (MFA users only)
Electronic eBook