Ohcanbohtosat
Fáddáevttohusat
Fáddáevttohusat
- Security measures
- Computer networks 523
- Computer security 321
- Prevention 152
- Internet 92
- Computer crimes 56
- Terrorism 52
- Access control 50
- Information technology 48
- Data protection 46
- Cyberterrorism 44
- Management 43
- Safety measures 40
- Cyberspace 34
- Information warfare 34
- Business enterprises 32
- Computers 30
- Examinations 30
- Computer hackers 28
- Firewalls (Computer security) 28
- Planning 28
- Certification 26
- Wireless communication systems 26
- Electronic commerce 24
- Industries 24
- Transportation 24
- Web sites 20
- Data encryption (Computer science) 18
- Electronic data processing personnel 18
- Evaluation 18
-
1
-
2
Managing information security : a program for the electronic information age /
Almmustuhtton 1982Girji -
3
-
4
-
5
-
6
The economic costs and implications of high-technology hardware theft
Almmustuhtton 1999An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
7
Security and control in information systems a guide for business and accounting /
Almmustuhtton 2000An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
8
-
9
Secure communicating systems design, analysis, and implementation /
Almmustuhtton 2001An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
10
Hack proofing ColdFusion
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
11
Configuring ISA server 2000 building firewalls for windows 2000 /
Almmustuhtton 2001An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
12
Managing Cisco network security
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
13
Hack proofing your wireless network
Almmustuhtton 2001An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
14
Hack proofing your network
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
15
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Almmustuhtton 2001An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
16
Hack proofing Windows 2000
Almmustuhtton 2001An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
17
Cisco security specialist's guide to PIX Firewall
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
18
Nokia Network security solutions handbook /
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
19
Customer fraud and business responses let the marketer beware /
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji -
20
Security+ study guide and DVD training system
Almmustuhtton 2002An electronic book accessible through the World Wide Web; click to view
Elektrovnnalaš E-girji