Risultati della ricerca
Soggetti all'interno della tua ricerca.
Soggetti all'interno della tua ricerca.
- Computer security
- Security measures 319
- Computer networks 262
- Data protection 84
- Access control 46
- Internet 41
- Computer crimes 38
- Prevention 38
- Computer hackers 37
- Computers 32
- Information technology 32
- Cryptography 26
- Examinations 26
- Management 25
- Certification 22
- Data encryption (Computer science) 22
- Electronic data processing personnel 20
- Cyberterrorism 18
- Privacy, Right of 17
- Firewalls (Computer security) 14
- Business enterprises 12
- Database security 12
- Law and legislation 12
- Operating systems (Computers) 12
- Systems and Data Security 12
- Computer science 10
- Computer software 10
- Computer viruses 10
- Embedded computer systems 10
- Reliability 10
-
1
-
2
Information assurance for the entrerprise : a roadmap to information security /
Pubblicazione 2007Libro -
3
-
4
-
5
-
6
-
7
Designing network security : a practical guide to creating a secure network infrastructure /
Pubblicazione 2004Libro -
8
-
9
-
10
Information assurance for the enterprise : a roadmap to information security /
Pubblicazione 2007Libro -
11
-
12
-
13
Security and control in information systems a guide for business and accounting /
Pubblicazione 2000An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
14
Hack proofing ColdFusion
Pubblicazione 2002An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
15
Configuring ISA server 2000 building firewalls for windows 2000 /
Pubblicazione 2001An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
16
Hack proofing Sun Solaris 8
Pubblicazione 2001An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
17
Hack proofing XML
Pubblicazione 2002An electronic book accessible through the World Wide Web; click to view
Elettronico eBook -
18
-
19
-
20