Showing 41 - 56 results of 56 for search '"computer security"', query time: 0.05s Refine Results
  1. 41

    Access contested : security, identity, and resistance in Asian cyberspace /

    Published 2012
    Subjects: “…Computer Security.…”
    Book
  2. 42

    Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework / by Singh, Abhinav

    Published 2012
    Subjects: “…Penetration testing (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 43

    Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework / by Singh, Abhinav

    Published 2012
    Subjects: “…Penetration testing (Computer security)…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 44

    Access contested : security, identity, and resistance in Asian cyberspace /

    Published 2012
    Subjects: “…Computer Security.…”
    Book
  5. 45
  6. 46
  7. 47
  8. 48
  9. 49

    Attribute-Based Encryption and Access Control by Huang, Dijiang

    Published 2020
    Subjects:
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  10. 50

    Attribute-Based Encryption and Access Control by Huang, Dijiang

    Published 2020
    Subjects:
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  11. 51

    Access Contested : Security, Identity, and Resistance in Asian Cyberspace /

    Published 2012
    Subjects:
    Full text available:
    Electronic eBook
  12. 52

    Access Contested : Security, Identity, and Resistance in Asian Cyberspace /

    Published 2012
    Subjects:
    Full text available:
    Electronic eBook
  13. 53

    Access Denied : The Practice and Policy of Global Internet Filtering /

    Published 2008
    Subjects:
    Full text available:
    Electronic eBook
  14. 54

    Access Denied : The Practice and Policy of Global Internet Filtering /

    Published 2008
    Subjects:
    Full text available:
    Electronic eBook
  15. 55

    Outsourcing information security by Axelrod, C. Warren

    Published 2004
    “…Artech House computer security series.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 56

    Outsourcing information security by Axelrod, C. Warren

    Published 2004
    “…Artech House computer security series.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook