Resultados da busca
Sugestões de Tópicos dentro de sua busca.
Sugestões de Tópicos dentro de sua busca.
- Computer security
- Security measures 319
- Computer networks 262
- Data protection 84
- Access control 46
- Internet 41
- Computer crimes 38
- Prevention 38
- Computer hackers 37
- Computers 32
- Information technology 32
- Cryptography 26
- Examinations 26
- Management 25
- Certification 22
- Data encryption (Computer science) 22
- Electronic data processing personnel 20
- Cyberterrorism 18
- Privacy, Right of 17
- Firewalls (Computer security) 14
- Business enterprises 12
- Database security 12
- Law and legislation 12
- Operating systems (Computers) 12
- Systems and Data Security 12
- Computer science 10
- Computer software 10
- Computer viruses 10
- Embedded computer systems 10
- Reliability 10
-
1
-
2
Information assurance for the entrerprise : a roadmap to information security /
Publicado em 2007Livro -
3
-
4
-
5
-
6
-
7
Designing network security : a practical guide to creating a secure network infrastructure /
Publicado em 2004Livro -
8
-
9
-
10
Information assurance for the enterprise : a roadmap to information security /
Publicado em 2007Livro -
11
-
12
-
13
Security and control in information systems a guide for business and accounting /
Publicado em 2000An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
14
Hack proofing ColdFusion
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
15
Configuring ISA server 2000 building firewalls for windows 2000 /
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
16
Hack proofing Sun Solaris 8
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
17
Hack proofing XML
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
18
Hack proofing your Web applications the only way to stop a hacker is to think like one /
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
19
Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one /
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
20
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico