Computer security : art and science /
Sábháilte in:
Príomhchruthaitheoir: | Bishop, Matt (Matthew A.) (Údar) |
---|---|
Rannpháirtithe: | Sullivan, Elisabeth (Rannpháirtí), Ruppel, Michelle (Rannpháirtí) |
Formáid: | LEABHAR |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Boston :
Addison-Wesley,
[2019]
|
Eagrán: | Second edition. |
Ábhair: | |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Principles of information security /
de réir: Whitman, Michael E., 1964-
Foilsithe / Cruthaithe: (2016)
de réir: Whitman, Michael E., 1964-
Foilsithe / Cruthaithe: (2016)
Cyber security engineering : a practical approach for systems and software assurance /
de réir: Mead, Nancy R.
Foilsithe / Cruthaithe: (2016)
de réir: Mead, Nancy R.
Foilsithe / Cruthaithe: (2016)
Information security practices : emerging threats and perspectives /
de réir: Traore, Issa
Foilsithe / Cruthaithe: (2016)
de réir: Traore, Issa
Foilsithe / Cruthaithe: (2016)
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014)
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014)
Cyber security culture : counteracting cyber threats through organizational learning and training /
de réir: Trim, Peter R. J.
Foilsithe / Cruthaithe: (2013)
de réir: Trim, Peter R. J.
Foilsithe / Cruthaithe: (2013)
Hacking exposed : malware and rootkits : security secrets & solutions /
de réir: Elisan, Christopher C., et al.
Foilsithe / Cruthaithe: (2017)
de réir: Elisan, Christopher C., et al.
Foilsithe / Cruthaithe: (2017)
Managing risk and information security : protect to enable /
de réir: Harkins, Malcolm W
Foilsithe / Cruthaithe: (2016)
de réir: Harkins, Malcolm W
Foilsithe / Cruthaithe: (2016)
The coming of Rain /
de réir: Marius, Richard
Foilsithe / Cruthaithe: (1969)
de réir: Marius, Richard
Foilsithe / Cruthaithe: (1969)
Futureproof : Security Aesthetics and the Management of Life /
Foilsithe / Cruthaithe: (2020)
Foilsithe / Cruthaithe: (2020)
Introduction to computer security /
de réir: Bishop, Matt
Foilsithe / Cruthaithe: (2006)
de réir: Bishop, Matt
Foilsithe / Cruthaithe: (2006)
Computer security fundamentals /
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
de réir: Easttom, Chuck
Foilsithe / Cruthaithe: (2006)
Computer security /
de réir: Gollmann, Dieter
Foilsithe / Cruthaithe: (2006)
de réir: Gollmann, Dieter
Foilsithe / Cruthaithe: (2006)
Computer and information security handbook
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Computer security : Principles and practice /
de réir: Stallings, William
Foilsithe / Cruthaithe: (2008)
de réir: Stallings, William
Foilsithe / Cruthaithe: (2008)
The essential guide to home computer security
de réir: Rowlingson, Robert R.
Foilsithe / Cruthaithe: (2011)
de réir: Rowlingson, Robert R.
Foilsithe / Cruthaithe: (2011)
Access Contested : Security, Identity, and Resistance in Asian Cyberspace /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Trust and security in collaborative computing
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
de réir: Zou, Xukai, 1963-
Foilsithe / Cruthaithe: (2008)
Security in distributed, grid, mobile, and pervasive computing /
de réir: Xiao, Yang
Foilsithe / Cruthaithe: (2007)
de réir: Xiao, Yang
Foilsithe / Cruthaithe: (2007)
Network security foundations
de réir: Strebe, Matthew
Foilsithe / Cruthaithe: (2004)
de réir: Strebe, Matthew
Foilsithe / Cruthaithe: (2004)
Computer and information security handbook
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Women, Peace, and Security in Professional Military Education /
Foilsithe / Cruthaithe: (2022)
Foilsithe / Cruthaithe: (2022)
Cloud security a comprehensive guide to secure cloud computing /
de réir: Krutz, Ronald L.
Foilsithe / Cruthaithe: (2010)
de réir: Krutz, Ronald L.
Foilsithe / Cruthaithe: (2010)
Securing the cloud cloud computer security techniques and tactics /
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
de réir: Winkler, J. R. (Joachim R.)
Foilsithe / Cruthaithe: (2011)
Secure computer and network systems modeling, analysis and design /
de réir: Ye, Nong
Foilsithe / Cruthaithe: (2008)
de réir: Ye, Nong
Foilsithe / Cruthaithe: (2008)
Security 2020 reduce security risks this decade /
de réir: Howard, Doug
Foilsithe / Cruthaithe: (2011)
de réir: Howard, Doug
Foilsithe / Cruthaithe: (2011)
Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW /
de réir: El-Bawab, Abd El-Monem A.
Foilsithe / Cruthaithe: (2014)
de réir: El-Bawab, Abd El-Monem A.
Foilsithe / Cruthaithe: (2014)
North American Arctic : Themes in Regional Security /
Foilsithe / Cruthaithe: (2019)
Foilsithe / Cruthaithe: (2019)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
de réir: Bradley, Tony
Foilsithe / Cruthaithe: (2006)
Network security /
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
Secure multi-party computation
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Information assurance and computer security
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Mastering network security
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
de réir: Brenton, Chris
Foilsithe / Cruthaithe: (2003)
Security risk management building an information security risk management program from the ground up /
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
de réir: Wheeler, Evan
Foilsithe / Cruthaithe: (2011)
Designing network security : a practical guide to creating a secure network infrastructure /
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
Network security evaluation using the NSA IEM /
de réir: Fuller, Ed
Foilsithe / Cruthaithe: (2005)
de réir: Fuller, Ed
Foilsithe / Cruthaithe: (2005)
Web commerce security design and development /
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
de réir: Nahari, Hadi
Foilsithe / Cruthaithe: (2011)
Security and privacy in the digital era.
de réir: Guerrier, Claudine
Foilsithe / Cruthaithe: (2016)
de réir: Guerrier, Claudine
Foilsithe / Cruthaithe: (2016)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
de réir: Mularien, Peter
Foilsithe / Cruthaithe: (2010)
Cryptography for security and privacy in cloud computing /
de réir: Rass, Stefan, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Rass, Stefan, et al.
Foilsithe / Cruthaithe: (2014)
Computers at risk safe computing in the information age /
Foilsithe / Cruthaithe: (1991)
Foilsithe / Cruthaithe: (1991)
Míreanna comhchosúla
-
Principles of information security /
de réir: Whitman, Michael E., 1964-
Foilsithe / Cruthaithe: (2016) -
Cyber security engineering : a practical approach for systems and software assurance /
de réir: Mead, Nancy R.
Foilsithe / Cruthaithe: (2016) -
Information security practices : emerging threats and perspectives /
de réir: Traore, Issa
Foilsithe / Cruthaithe: (2016) -
The basics of information security : understanding the fundamentals of InfoSec in theory and practice /
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014) -
Cyber security culture : counteracting cyber threats through organizational learning and training /
de réir: Trim, Peter R. J.
Foilsithe / Cruthaithe: (2013)