Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Computers
- Access control 50
- Computer security 24
- Computer networks 18
- Security measures 18
- History 16
- Social aspects 16
- Electronic data processing 12
- Penetration testing (Computer security) 10
- Computer engineering 8
- Computer software 8
- Human-computer interaction 8
- Information technology 8
- Passwords 8
- Computers and civilization 6
- Cyberspace 6
- Quantum computers 6
- Testing 6
- Computer architecture 4
- Computer science 4
- Data encryption (Computer science) 4
- Database security 4
- Firewalls (Computer security) 4
- Internet 4
- Laptop computers 4
- Programming 4
- Application software 2
- Artificial intelligence 2
- Brain 2
- C++ (Computer program language) 2
-
1
Makin' numbers Howard Aiken and the computer /
Pubblicazione 1999An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
2
Check Point NG next generation security administration /
Pubblicazione 2002An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
3
Between human and machine feedback, control, and computing before cybernetics /
Pubblicazione 2002An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
4
ExamWise for CompTIA A+ core hardware examination 220-221 /
Pubblicazione 2003An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
5
Security assessment case studies for implementing the NSA lAM /
Pubblicazione 2004An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
6
Cyborgs@cyberspace? an ethnographer looks to the future /
Pubblicazione 1999An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
7
Islands in the clickstream reflections on life in a virtual world /
Pubblicazione 2004An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
8
C++ programming fundamentals
Pubblicazione 2003An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
9
Role-based access control
Pubblicazione 2003An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
10
Outsourcing information security
Pubblicazione 2004An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
11
User's guide to cryptography and standards
Pubblicazione 2005An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
12
Physical computing sensing and controlling the physical world with computers /
Pubblicazione 2004An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
13
Maran illustrated computers guided tour
Pubblicazione 2005An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
14
Metrics for software conceptual models
Pubblicazione 2005An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
15
Perfect passwords selection, protection, authentication /
Pubblicazione 2006An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
16
-
17
Groovy programming an introduction for Java developers /
Pubblicazione 2006An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
18
Effective prototyping for software makers
Pubblicazione 2007An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
19
The second self computers and the human spirit /
Pubblicazione 2005An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
20