Ngā hua rapu
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Security measures
- Computer networks 523
- Computer security 321
- Prevention 152
- Internet 92
- Computer crimes 56
- Terrorism 52
- Access control 50
- Information technology 48
- Data protection 46
- Cyberterrorism 44
- Management 43
- Safety measures 40
- Cyberspace 34
- Information warfare 34
- Business enterprises 32
- Computers 30
- Examinations 30
- Computer hackers 28
- Firewalls (Computer security) 28
- Planning 28
- Certification 26
- Wireless communication systems 26
- Electronic commerce 24
- Industries 24
- Transportation 24
- Web sites 20
- Data encryption (Computer science) 18
- Electronic data processing personnel 18
- Evaluation 18
-
1
-
2
Managing information security : a program for the electronic information age /
I whakaputaina 1982Pukapuka -
3
-
4
-
5
-
6
The economic costs and implications of high-technology hardware theft
I whakaputaina 1999An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
7
Security and control in information systems a guide for business and accounting /
I whakaputaina 2000An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
8
-
9
Secure communicating systems design, analysis, and implementation /
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
10
Hack proofing ColdFusion
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
11
Configuring ISA server 2000 building firewalls for windows 2000 /
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
12
Managing Cisco network security
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
13
Hack proofing your wireless network
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
14
Hack proofing your network
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
15
-
16
Hack proofing Windows 2000
I whakaputaina 2001An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
17
Cisco security specialist's guide to PIX Firewall
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
18
Nokia Network security solutions handbook /
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
19
Customer fraud and business responses let the marketer beware /
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
20
Security+ study guide and DVD training system
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka