Digital whoness identity, privacy and freedom in the cyberworld /
Sábháilte in:
Príomhchruthaitheoir: | Capurro, Rafael |
---|---|
Údar corparáideach: | ebrary, Inc |
Rannpháirtithe: | Eldred, Michael, Nagel, Daniel |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Frankfurt :
Ontos Verlag,
2013.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Diasporic identities and empire : cultural contentions and literacy landscapes /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
The idea of identification
de réir: Woodward, Gary C.
Foilsithe / Cruthaithe: (2003)
de réir: Woodward, Gary C.
Foilsithe / Cruthaithe: (2003)
Security and privacy in the digital era.
de réir: Guerrier, Claudine
Foilsithe / Cruthaithe: (2016)
de réir: Guerrier, Claudine
Foilsithe / Cruthaithe: (2016)
Unity in diversity.
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Invasion of privacy! big brother and the company hackers /
de réir: Weber, Michael
Foilsithe / Cruthaithe: (2004)
de réir: Weber, Michael
Foilsithe / Cruthaithe: (2004)
Identity management concepts, technologies, and systems /
de réir: Bertino, Elisa
Foilsithe / Cruthaithe: (2011)
de réir: Bertino, Elisa
Foilsithe / Cruthaithe: (2011)
Unauthorised access physical penetration testing for IT security teams /
de réir: Allsopp, Wil
Foilsithe / Cruthaithe: (2009)
de réir: Allsopp, Wil
Foilsithe / Cruthaithe: (2009)
Cryptography for security and privacy in cloud computing /
de réir: Rass, Stefan, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Rass, Stefan, et al.
Foilsithe / Cruthaithe: (2014)
Aspects of network and information security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Culture and power : identity and identification /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
SSL and TLS theory and practice /
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2009)
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2009)
Ethereal packet sniffing /
de réir: Orebaugh, Angela
Foilsithe / Cruthaithe: (2004)
de réir: Orebaugh, Angela
Foilsithe / Cruthaithe: (2004)
Information assurance dependability and security in networked systems /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Beyond cybersecurity : protecting your digital business /
de réir: Kaplan, James M.
Foilsithe / Cruthaithe: (2015)
de réir: Kaplan, James M.
Foilsithe / Cruthaithe: (2015)
Microsoft DirectAccess best practices and troubleshooting /
de réir: Krause, Jordan
Foilsithe / Cruthaithe: (2013)
de réir: Krause, Jordan
Foilsithe / Cruthaithe: (2013)
Virtual private networking a construction, operation and utilization guide /
de réir: Held, Gilbert, 1943-
Foilsithe / Cruthaithe: (2004)
de réir: Held, Gilbert, 1943-
Foilsithe / Cruthaithe: (2004)
Nessus network auditing
de réir: Beale, Jay
Foilsithe / Cruthaithe: (2004)
de réir: Beale, Jay
Foilsithe / Cruthaithe: (2004)
Cisco security specialist's guide to PIX Firewall
de réir: Osipov, Vitaly
Foilsithe / Cruthaithe: (2002)
de réir: Osipov, Vitaly
Foilsithe / Cruthaithe: (2002)
Nokia Network security solutions handbook /
de réir: Maxwell, Douglas D.
Foilsithe / Cruthaithe: (2002)
de réir: Maxwell, Douglas D.
Foilsithe / Cruthaithe: (2002)
Techno security's guide to e-discovery and digital forensics
de réir: Wiles, Jack
Foilsithe / Cruthaithe: (2007)
de réir: Wiles, Jack
Foilsithe / Cruthaithe: (2007)
Intrusion prevention and active response deploying network and host IPS /
de réir: Rash, Michael
Foilsithe / Cruthaithe: (2005)
de réir: Rash, Michael
Foilsithe / Cruthaithe: (2005)
Secure computer and network systems modeling, analysis and design /
de réir: Ye, Nong
Foilsithe / Cruthaithe: (2008)
de réir: Ye, Nong
Foilsithe / Cruthaithe: (2008)
Cybersecurity operations handbook
de réir: Rittinghouse, John W.
Foilsithe / Cruthaithe: (2003)
de réir: Rittinghouse, John W.
Foilsithe / Cruthaithe: (2003)
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
Silence on the wire a field guide to passive reconnaissance and indirect attacks /
de réir: Zalewski, Michal
Foilsithe / Cruthaithe: (2005)
de réir: Zalewski, Michal
Foilsithe / Cruthaithe: (2005)
How to cheat at Configuring ISA Server 2004
de réir: Shinder, Dr. Thomas W.
Foilsithe / Cruthaithe: (2004)
de réir: Shinder, Dr. Thomas W.
Foilsithe / Cruthaithe: (2004)
Buffer overflow attacks detect, exploit, prevent /
de réir: Foster, James C.
Foilsithe / Cruthaithe: (2005)
de réir: Foster, James C.
Foilsithe / Cruthaithe: (2005)
Cyber adversary characterization auditing the hacker mind /
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Hacking the code ASP. NET web application security /
de réir: Burnett, Mark (Mark M.)
Foilsithe / Cruthaithe: (2004)
de réir: Burnett, Mark (Mark M.)
Foilsithe / Cruthaithe: (2004)
Security sage's guide to hardening the network infrastructure
de réir: Andrés, Steven
Foilsithe / Cruthaithe: (2004)
de réir: Andrés, Steven
Foilsithe / Cruthaithe: (2004)
Security risk management building an information security risk management program from the ground up /
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
Snort 2.0 intrusion detection
de réir: Beale, Jay
Foilsithe / Cruthaithe: (2003)
de réir: Beale, Jay
Foilsithe / Cruthaithe: (2003)
Mastering network security
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
The misuse of information systems the impact of security countermeasures /
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
de réir: D'Arcy, John P., 1975-
Foilsithe / Cruthaithe: (2007)
Network security evaluation using the NSA IEM /
de réir: Fuller, Ed
Foilsithe / Cruthaithe: (2005)
de réir: Fuller, Ed
Foilsithe / Cruthaithe: (2005)
Network security foundations
de réir: Strebe, Matthew
Foilsithe / Cruthaithe: (2004)
de réir: Strebe, Matthew
Foilsithe / Cruthaithe: (2004)
Threat modeling : designing for security /
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
de réir: Shostack, Adam
Foilsithe / Cruthaithe: (2014)
The essential guide to home computer security
de réir: Rowlingson, Robert R.
Foilsithe / Cruthaithe: (2011)
de réir: Rowlingson, Robert R.
Foilsithe / Cruthaithe: (2011)
Network security /
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
Computer and information security handbook
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Míreanna comhchosúla
-
Diasporic identities and empire : cultural contentions and literacy landscapes /
Foilsithe / Cruthaithe: (2013) -
The idea of identification
de réir: Woodward, Gary C.
Foilsithe / Cruthaithe: (2003) -
Security and privacy in the digital era.
de réir: Guerrier, Claudine
Foilsithe / Cruthaithe: (2016) -
Unity in diversity.
Foilsithe / Cruthaithe: (2013) -
Invasion of privacy! big brother and the company hackers /
de réir: Weber, Michael
Foilsithe / Cruthaithe: (2004)