Resultados da busca
Sugestões de Tópicos dentro de sua busca.
Sugestões de Tópicos dentro de sua busca.
- Security measures
- Computer networks 523
- Computer security 321
- Prevention 152
- Internet 92
- Computer crimes 56
- Terrorism 52
- Access control 50
- Information technology 48
- Data protection 46
- Cyberterrorism 44
- Management 43
- Safety measures 40
- Cyberspace 34
- Information warfare 34
- Business enterprises 32
- Computers 30
- Examinations 30
- Computer hackers 28
- Firewalls (Computer security) 28
- Planning 28
- Certification 26
- Wireless communication systems 26
- Electronic commerce 24
- Industries 24
- Transportation 24
- Web sites 20
- Data encryption (Computer science) 18
- Electronic data processing personnel 18
- Evaluation 18
-
1
-
2
Managing information security : a program for the electronic information age /
Publicado em 1982Livro -
3
-
4
-
5
-
6
The economic costs and implications of high-technology hardware theft
Publicado em 1999An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
7
Security and control in information systems a guide for business and accounting /
Publicado em 2000An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
8
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
9
Secure communicating systems design, analysis, and implementation /
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
10
Hack proofing ColdFusion
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
11
Configuring ISA server 2000 building firewalls for windows 2000 /
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
12
Managing Cisco network security
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
13
Hack proofing your wireless network
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
14
Hack proofing your network
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
15
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
16
Hack proofing Windows 2000
Publicado em 2001An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
17
Cisco security specialist's guide to PIX Firewall
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
18
Nokia Network security solutions handbook /
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
19
Customer fraud and business responses let the marketer beware /
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico -
20
Security+ study guide and DVD training system
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Eletrônico livro eletrônico