Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Security measures 69
- Computer networks 57
- Data protection 21
- Computer hackers 12
- Certification 11
- Cryptography 11
- Examinations 11
- Electronic data processing personnel 10
- Access control 9
- Internet 9
- Computers 8
- Computer crimes 7
- Information technology 6
- Computer software 5
- Management 5
- Operating systems (Computers) 5
- Data encryption (Computer science) 4
- Database security 4
- Firewalls (Computer security) 4
- Reliability 4
- Client/server computing 3
- Computer viruses 3
- Digital watermarking 3
- Electronic commerce 3
- Forensic sciences 3
- Prevention 3
- Software protection 3
- World Wide Web 3
- Application software 2
-
1
-
2
-
3
Fuzzing for software security testing and quality assurance
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Mac security bible
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Algorithms, architectures and information systems security
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
6
Modelling cyber security approaches, methodology, strategies /
Published 2009An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
CEH certified ethical hacker study guide /
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
-
9
-
10
Professional Cocoa application security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Dear hacker letters to the editor of 2600 /
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Logics and languages for reliability and security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
-
14
-
15
-
16
-
17
-
18
Identity management concepts, technologies, and systems /
Published 2011An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
-
20