Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Security measures 164
- Computer networks 136
- Data protection 50
- Access control 28
- Computer hackers 26
- Computers 24
- Cryptography 24
- Certification 22
- Examinations 22
- Computer crimes 20
- Electronic data processing personnel 20
- Internet 20
- Data encryption (Computer science) 16
- Prevention 16
- Information technology 14
- COMPUTERS / Security / General 12
- Management 12
- Operating systems (Computers) 12
- Computer software 10
- COMPUTERS / Cryptography 8
- Client/server computing 8
- Cloud computing 8
- Database security 8
- Firewalls (Computer security) 8
- Reliability 8
- Artificial intelligence 6
- COMPUTERS / Computer Graphics / Game Programming & Design 6
- Computer science 6
- Computer viruses 6
-
161
-
162
Hacking for dummies
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
163
-
164
-
165
Safety of computer architectures
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
166
Secure multi-party computation
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
167
-
168
Proceedings of the First International Workshop on Coding and Cryptology, Wuyi Mountain, Fujian, China 11-15 June 2007
Published 2008An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
169
Safety management for software-based equipment
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
170
Information security management principles
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
171
Managing information security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
172
Cyber security and IT infrastructure protection /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
173
OAuth 2.0 identity and access management patterns /
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
174
Instant Java password and authentication security /
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
175
Getting started with FortiGate /
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
176
Relation based access control /
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
177
-
178
Detection and intelligent systems for homeland security. /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
179
-
180
Threat modeling : designing for security /
Published 2014An electronic book accessible through the World Wide Web; click to view
Electronic eBook