Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Computers
- Access control 18
- Security measures 16
- Computer security 12
- Testing 6
- Data encryption (Computer science) 4
- Penetration testing (Computer security) 4
- COMPUTERS / Database Management / Data Mining 2
- COMPUTERS / Security / General 2
- Database security 2
- Identification 2
- Security 2
- TECHNOLOGY / Engineering / Industrial 2
-
1
Role-based access control
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Role-based access control
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
Published 2014Subjects: “…Computer security.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Role-based access control
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Role-based access control
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Network security /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Network security /
Published 2014Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
-
10
-
11
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
Published 2011Subjects: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
Published 2011Subjects: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
-
14
-
15
Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework /
Published 2012Subjects: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework /
Published 2012Subjects: “…Penetration testing (Computer security)…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Attribute-Based Encryption and Access Control
Published 2020Subjects: Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
18
Attribute-Based Encryption and Access Control
Published 2020Subjects: Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
19
Outsourcing information security
Published 2004“…Artech House computer security series.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Outsourcing information security
Published 2004“…Artech House computer security series.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook