Ngā hua rapu
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Security measures
- Computer networks 261
- Computer security 160
- Prevention 76
- Internet 46
- Computer crimes 28
- Terrorism 26
- Access control 25
- Information technology 24
- Data protection 23
- Cyberterrorism 22
- Management 21
- Safety measures 20
- Cyberspace 17
- Information warfare 17
- Business enterprises 16
- Computers 15
- Examinations 15
- Computer hackers 14
- Firewalls (Computer security) 14
- Planning 14
- Certification 13
- Wireless communication systems 13
- Electronic commerce 12
- Industries 12
- Transportation 12
- Web sites 10
- Data encryption (Computer science) 9
- Electronic data processing personnel 9
- Evaluation 9
-
1
-
2
Managing information security : a program for the electronic information age /
I whakaputaina 1982Pukapuka -
3
-
4
-
5
-
6
The economic costs and implications of high-technology hardware theft
I whakaputaina 1999An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
7
Security and control in information systems a guide for business and accounting /
I whakaputaina 2000An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
8
-
9
Secure communicating systems design, analysis, and implementation /
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
10
Hack proofing ColdFusion
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
11
Configuring ISA server 2000 building firewalls for windows 2000 /
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
12
Managing Cisco network security
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
13
Hack proofing your wireless network
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
14
Hack proofing your network
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
15
-
16
Hack proofing Windows 2000
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
17
Cisco security specialist's guide to PIX Firewall
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
18
Nokia Network security solutions handbook /
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
19
Customer fraud and business responses let the marketer beware /
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
20
Security+ study guide and DVD training system
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka