Search Results - "Computer security."
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 465
- Security measures 270
- Computer networks 199
- Computer Security 184
- Data protection 58
- Access control 36
- Computer crimes 36
- Penetration testing (Computer security) 36
- Prevention 34
- Information technology 31
- Management 30
- Computers 29
- Hackers 26
- Internet 26
- Law and legislation 21
- Examinations 20
- Cloud computing 19
- Firewalls (Computer security) 19
- Certification 17
- Business enterprises 16
- Cryptography 16
- Electronic data processing personnel 16
- Data processing 15
- Cyberterrorism 14
- Privacy, Right of 14
- Computer software 13
- Data encryption (Computer science) 12
- Cyber intelligence (Computer security) 11
- Investigation 11
- Cyberspace 10
-
241
Formal Logical Methods for System Security and Correctness.
Published 2008Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic eBook -
242
Implementing Database Security and Auditing.
Published 2005Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
243
Algorithms, architectures and information systems security
Published 2009Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
244
Network security evaluation : using the NSA IEM
Published 2005Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
245
Secure telematic applications for national scale projects
Published 2008Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
246
Logics and languages for reliability and security
Published 2010Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
247
Official (ISC)2 guide to the ISSMP CBK
Published 2011Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
248
PfSense 2 Cookbook.
Published 2011Subjects: “…Firewalls (Computer security)…”
Full text (MFA users only)
Electronic eBook -
249
Technocrime, policing, and surveillance
Published 2013Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
250
How to Cheat at Configuring ISA Server 2004.
Published 2006Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
251
Web application security is a stack : how to CYA (Cover Your Apps) completely
Published 2015Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
252
Information Security A Practical Guide : Bridging the gap between IT and management.
Published 2015Subjects: “…Computer security Management.…”
Full text (MFA users only)
Electronic eBook -
253
Python GUI Programming Cookbook.
Published 2015Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
254
From hacking to report writing : an introduction to security and penetration testing
Published 2016Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
255
Critical infrastructure protection against hybrid warfare security related challenges
Published 2016Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
256
Information Systems and Security : Insider Threats.
Published 2018Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
257
Outfox'em : Protecting Yourself and Your Family from Cyber Threats.
Published 2018Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
258
Cybersecurity and Decision Makers : Data Security and Digital Trust.
Published 2020Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
259
La gestion des identités numériques
Published 2015Subjects: “…Computer security.…”
Full text (MFA users only)
eBook -
260
Kali Linux Penetration Testing Bible
Published 2021Subjects: “…Penetration testing (Computer security)…”
Full text (MFA users only)
Electronic eBook