Resultados da pesquisa

Refinar resultados
  1. 1

    Facing up to nuclear power : a contribution to the debate on the risks and potentialities of the large-scale use of nuclear energy /

    Publicado em 1976
    Livro
  2. 2

    Managing information security : a program for the electronic information age / Por Schweitzer, James A., 1929-

    Publicado em 1982
    Livro
  3. 3

    Cryptography and network security : principles and practice / Por Stallings, William

    Publicado em 2006
    Livro
  4. 4

    Computer security fundamentals / Por Easttom, Chuck

    Publicado em 2006
    Livro
  5. 5

    Security and privacy in mobile and wireless networking /

    Publicado em 2009
    Livro
  6. 6

    The economic costs and implications of high-technology hardware theft Por Dertouzos, James N., 1950-

    Publicado em 1999
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  7. 7

    Security and control in information systems a guide for business and accounting / Por Hawker, Andrew

    Publicado em 2000
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  8. 8
  9. 9

    Secure communicating systems design, analysis, and implementation / Por Huth, Michael, 1962-

    Publicado em 2001
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  10. 10

    Hack proofing ColdFusion Por Meyer, Greg

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  11. 11

    Configuring ISA server 2000 building firewalls for windows 2000 / Por Shinder, Thomas W.

    Publicado em 2001
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  12. 12

    Managing Cisco network security

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  13. 13

    Hack proofing your wireless network Por Owens, Les

    Publicado em 2001
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  14. 14

    Hack proofing your network

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  15. 15

    Hack proofing your e-commerce site the only way to stop a hacker is to think like one /

    Publicado em 2001
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  16. 16

    Hack proofing Windows 2000 Por Todd, Chad

    Publicado em 2001
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  17. 17

    Cisco security specialist's guide to PIX Firewall Por Osipov, Vitaly

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  18. 18

    Nokia Network security solutions handbook / Por Maxwell, Douglas D.

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  19. 19

    Customer fraud and business responses let the marketer beware / Por Tian, Kelly

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  20. 20

    Security+ study guide and DVD training system Por Cross, Michael

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico