Suggested Topics within your search.
Suggested Topics within your search.
- Data protection 70
- Computer security 50
- Security measures 8
- Computer networks 6
- Digital watermarking 6
- Management 6
- Artificial intelligence 4
- Data recovery (Computer science) 4
- Information technology 4
- Privacy, Right of 4
- Artificial Intelligence (incl. Robotics) 2
- Backup processing alternatives 2
- Business Information Systems 2
- COMPUTERS / Computer Graphics / Game Programming & Design 2
- COMPUTERS / Information Technology 2
- COMPUTERS / Security / General 2
- Certification 2
- Cloud computing 2
- Coding theory 2
- Combinatorial analysis 2
- Computer Science 2
- Computer Systems Organization and Communication Networks 2
- Computer crimes 2
- Computer network architectures 2
- Computer science 2
- Credit cards 2
- Cryptography 2
- Data Mining and Knowledge Discovery 2
- Data integrity 2
- Data mining 2
-
1
Data protection and consumer privacy an Emerald guide.
Published 2004Subjects: “…Data protection.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Data protection and consumer privacy an Emerald guide.
Published 2004Subjects: “…Data protection.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Information assurance for the enterprise : a roadmap to information security /
Published 2007Subjects:Book -
4
Data privacy in the information age
Published 2000Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Information assurance and computer security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
7
-
8
A process for developing a common vocabulary in the information security area
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
9
Comptia Security+ 2008 in depth
Published 2009Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Information security policy, processes, and practices /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Getting started with FortiGate /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Getting started with FortiGate /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Information assurance for the enterprise : a roadmap to information security /
Published 2007Subjects:Book -
14
Data privacy in the information age
Published 2000Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Information assurance and computer security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
-
18
A process for developing a common vocabulary in the information security area
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
19
Comptia Security+ 2008 in depth
Published 2009Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Information security policy, processes, and practices /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook