Showing 141 - 160 results of 416 for search '"Computers."', query time: 0.06s Refine Results
  1. 141

    Formal logical methods for system security and correctness

    Published 2008
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  2. 142

    Gray hat Python Python programming for hackers and reverse engineers / by Seitz, Justin

    Published 2009
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 143
  4. 144

    Threat modeling : designing for security / by Shostack, Adam

    Published 2014
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 145

    Cloud management and security / by Abbadi, Imad M.

    Published 2014
    Subjects: “…Cloud computing.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 146
  7. 147

    Gray hat Python Python programming for hackers and reverse engineers / by Seitz, Justin

    Published 2009
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 148
  9. 149

    Threat modeling : designing for security / by Shostack, Adam

    Published 2014
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 150

    Cloud management and security / by Abbadi, Imad M.

    Published 2014
    Subjects: “…Cloud computing.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 151
  12. 152
  13. 153
  14. 154

    Computer security fundamentals / by Easttom, Chuck

    Published 2006
    Subjects:
    Book
  15. 155

    Invasion of privacy! big brother and the company hackers / by Weber, Michael

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 156
  17. 157

    Cyber adversary characterization auditing the hacker mind /

    Published 2004
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 158

    Java security by Sethi, Harpreet

    Published 2002
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 159

    Microsoft Windows 2000 security by Gupta, Rashi, 1977-

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 160