Resultados da pesquisa - "Computer Security."

Refinar resultados
  1. 1

    Best damn firewall book period

    Publicado em 2007
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  2. 2

    Security 2020 reduce security risks this decade / Por Howard, Doug

    Publicado em 2011
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  3. 3

    Untangle network security : secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW / Por El-Bawab, Abd El-Monem A.

    Publicado em 2014
    Assuntos: “...Firewalls (Computer security)...”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  4. 4

    Computer security : Principles and practice / Por Stallings, William

    Publicado em 2008
    Assuntos: “...Computer security....”
    Livro
  5. 5

    Introduction to computer security / Por Bishop, Matt

    Publicado em 2006
    Assuntos: “...Computer security....”
    Livro
  6. 6

    Computer security / Por Gollmann, Dieter

    Publicado em 2006
    Assuntos: “...Computer security....”
    Livro
  7. 7

    Computers at risk safe computing in the information age /

    Publicado em 1991
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  8. 8

    Least privilege security for Windows 7, Vista, And XP secure desktops for regulatory compliance and business agility / Por Smith, Russell

    Publicado em 2010
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  9. 9

    Formal models and techniques for analyzing security protocols

    Publicado em 2011
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  10. 10

    Safety management for software-based equipment Por Boulanger, Jean-Louis

    Publicado em 2013
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  11. 11

    Data-driven security : analysis, visualization and dashboards / Por Jacobs, Jay

    Publicado em 2014
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  12. 12
  13. 13

    Demystifying Intelligent Multimode Security Systems : An Edge-To-Cloud Cybersecurity Solutions Guide / Por Booth, Jody

    Publicado em 2023
    Assuntos: “...Computer security....”
    Click to View
    Recurso Electrónico livro electrónico
  14. 14

    Hack proofing Linux: a guide to open source security the only way to stop a hacker is to think like one / Por Stanger, James

    Publicado em 2001
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  15. 15

    Linux security Por Siddiqui, Shadab

    Publicado em 2002
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  16. 16

    Cyber spying tracking your family's (sometimes) secret online lives / Por Fair, Ted

    Publicado em 2005
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  17. 17

    Contemporary cryptography Por Oppliger, Rolf

    Publicado em 2005
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  18. 18

    Basics of contemporary cryptography for IT practitioners Por Ryabko, Boris

    Publicado em 2005
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  19. 19

    Firewall design and analysis Por Liu, Alex X.

    Publicado em 2011
    Assuntos: “...Firewalls (Computer security)...”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  20. 20

    Hacking the hacker / Por Grimes, Roger A.

    Publicado em 2017
    Assuntos: “...Computer security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico