Search Results - "Computer security."
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 465
- Security measures 270
- Computer networks 199
- Computer Security 184
- Data protection 58
- Access control 36
- Computer crimes 36
- Penetration testing (Computer security) 36
- Prevention 34
- Information technology 31
- Management 30
- Computers 29
- Hackers 26
- Internet 26
- Law and legislation 21
- Examinations 20
- Cloud computing 19
- Firewalls (Computer security) 19
- Certification 17
- Business enterprises 16
- Cryptography 16
- Electronic data processing personnel 16
- Data processing 15
- Cyberterrorism 14
- Privacy, Right of 14
- Computer software 13
- Data encryption (Computer science) 12
- Cyber intelligence (Computer security) 11
- Investigation 11
- Cyberspace 10
-
361
Trust and Security in Collaborative Computing.
Published 2008Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
362
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications.
Published 2014Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
363
88 Privacy Breaches to Beware Of : Practical Data Protection Tips from Real-Life Experiences.
Published 2016Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
364
Meeting security challenges through data analytics and decision support
Published 2016Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
365
Mastering Kali Linux for Advanced Penetration Testing : Secure Your Network with Kali Linux 2019. 1 - the Ultimate White Hat Hackers' Toolkit.
Published 2019Subjects: “…Penetration testing (Computer security)…”
Full text (MFA users only)
Electronic eBook -
366
The Internet in everything : freedom and security in a world with no off switch
Published 2020Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
367
Blockchain technology and applications
Published 2020Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
368
Computer security aspects of design for instrumentation and control systems at nuclear power plants
Published 2020Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
369
Metamorfosis del estado : maremoto digital y ciberseguridad.
Published 2022Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
370
Windows forensic analysis : DVD toolkit
Published 2007Subjects: “…Computer Security…”
Full text (MFA users only)
Electronic eBook -
371
Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security.
Published 2006Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
372
Medical data privacy handbook
Published 2015Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
373
Developer's guide to web application security
Published 2007Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
374
Applied public key infrastructure : 4th International Workshop : IWAP 2005
Published 2005Subjects: “…Public key infrastructure (Computer security) Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
375
Distributed systems security : issues, processes, and solutions
Published 2009Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
376
Modelling cyber security : approaches, methodology, strategies
Published 2009Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
377
Hashing in computer science : fifty years of slicing and dicing
Published 2010Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
378
Software and systems safety : specification and verification
Published 2011Subjects: “…Computer security Congresses.…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
379
Practical Malware Analysis : a Hands-On Guide to Dissecting Malicious Software.
Published 2012Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook -
380
Enterprise Security : a Data-Centric Approach to Securing the Enterprise.
Published 2013Subjects: “…Computer security.…”
Full text (MFA users only)
Electronic eBook