Search Results - "Computer security."

  1. 241

    Formal Logical Methods for System Security and Correctness. by Grumberg, O.

    Published 2008
    Subjects: “…Computer security Congresses.…”
    Full text (MFA users only)
    Electronic eBook
  2. 242

    Implementing Database Security and Auditing. by Natan, Ron Ben

    Published 2005
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  3. 243

    Algorithms, architectures and information systems security

    Published 2009
    Subjects: “…Computer security Congresses.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  4. 244

    Network security evaluation : using the NSA IEM by Fuller, Ed

    Published 2005
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  5. 245

    Secure telematic applications for national scale projects

    Published 2008
    Subjects: “…Computer security Congresses.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  6. 246

    Logics and languages for reliability and security

    Published 2010
    Subjects: “…Computer security Congresses.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  7. 247

    Official (ISC)2 guide to the ISSMP CBK

    Published 2011
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  8. 248

    PfSense 2 Cookbook. by Williamson, Matt

    Published 2011
    Subjects: “…Firewalls (Computer security)…”
    Full text (MFA users only)
    Electronic eBook
  9. 249

    Technocrime, policing, and surveillance

    Published 2013
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  10. 250

    How to Cheat at Configuring ISA Server 2004. by Shinder, Debra Littlejohn

    Published 2006
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  11. 251

    Web application security is a stack : how to CYA (Cover Your Apps) completely by Vittie, Lori Mac

    Published 2015
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  12. 252

    Information Security A Practical Guide : Bridging the gap between IT and management. by Mooney, Tom

    Published 2015
    Subjects: “…Computer security Management.…”
    Full text (MFA users only)
    Electronic eBook
  13. 253

    Python GUI Programming Cookbook. by Meier, Burkhard A.

    Published 2015
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  14. 254

    From hacking to report writing : an introduction to security and penetration testing by Svensson, Robert

    Published 2016
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  15. 255

    Critical infrastructure protection against hybrid warfare security related challenges

    Published 2016
    Subjects: “…Computer security Congresses.…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  16. 256

    Information Systems and Security : Insider Threats. by Arduin, Pierre-Emmanuel

    Published 2018
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  17. 257

    Outfox'em : Protecting Yourself and Your Family from Cyber Threats. by McDonough, Bart R.

    Published 2018
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  18. 258

    Cybersecurity and Decision Makers : Data Security and Digital Trust. by De éminville, Marie

    Published 2020
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    Electronic eBook
  19. 259

    La gestion des identités numériques

    Published 2015
    Subjects: “…Computer security.…”
    Full text (MFA users only)
    eBook
  20. 260

    Kali Linux Penetration Testing Bible by Khawaja, Gus

    Published 2021
    Subjects: “…Penetration testing (Computer security)…”
    Full text (MFA users only)
    Electronic eBook