Showing 141 - 160 results of 821 for search '"computer security"', query time: 0.05s Refine Results
  1. 141

    Aggressive network self-defense by Wyler, Neil R.

    Published 2005
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 142

    Mission-critical network planning by Liotine, Matthew

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 143

    A practical guide to managing information security by Purser, Steve

    Published 2004
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 144
  5. 145

    zSeries crypto guide update

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 146
  7. 147

    Combating spyware in the enterprise

    Published 2006
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 148

    Part-themed issue on internet security

    Published 2006
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 149

    Zen and the art of information security by Winkler, Ira

    Published 2007
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 150

    Algorithms, architectures and information systems security

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  11. 151
  12. 152

    Information security management principles by Alexander, David

    Published 2013
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 153

    OAuth 2.0 identity and access management patterns / by Spasovski, Martin

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 154
  15. 155

    Chinese cybersecurity and defense /

    Published 2014
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 156

    Algorithms, architectures and information systems security

    Published 2009
    Subjects: “…Computer security Congresses.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook
  17. 157
  18. 158

    Information security management principles by Alexander, David

    Published 2013
    Subjects: “…Computer security Management.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 159

    OAuth 2.0 identity and access management patterns / by Spasovski, Martin

    Published 2013
    Subjects: “…Computer security.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 160