Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Security measures 78
- Computer networks 65
- Data protection 22
- Access control 14
- Computer hackers 13
- Computers 12
- Certification 11
- Cryptography 11
- Examinations 11
- Electronic data processing personnel 10
- Internet 10
- Computer crimes 8
- Information technology 6
- Management 6
- Operating systems (Computers) 6
- Prevention 6
- Computer software 5
- Data encryption (Computer science) 5
- Client/server computing 4
- Database security 4
- Firewalls (Computer security) 4
- Reliability 4
- Cloud computing 3
- Computer viruses 3
- Cyberterrorism 3
- Digital watermarking 3
- Directory services (Computer network technology) 3
- Electronic commerce 3
- Electronic information resources 3
-
1
-
2
-
3
Fuzzing for software security testing and quality assurance
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Mac security bible
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Algorithms, architectures and information systems security
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Modelling cyber security approaches, methodology, strategies /
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
CEH certified ethical hacker study guide /
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
-
9
-
10
Professional Cocoa application security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Dear hacker letters to the editor of 2600 /
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Logics and languages for reliability and security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
-
14
-
15
-
16
-
17
-
18
Identity management concepts, technologies, and systems /
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
-
20